Analysis

  • max time kernel
    129s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-de-20211104
  • submitted
    01-12-2021 00:09

General

  • Target

    https://nawa-store.com/shopinside

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://nawa-store.com/shopinside
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:340994 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:406538 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 1584
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1836
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:537624 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275500 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1916

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1c39749190992ef47eecaa87f05aa46e

    SHA1

    f3a6ee9ef91142f57ea6c688c83c2af86296dc4f

    SHA256

    d4622556239909f14542ab41999efe01d2f186eb03b20cb84e59c2e95f86f1af

    SHA512

    3aa4f7e9831b29968ada6e8ec9cb56f78a53a96a585289995929b871013695a56a502f7d75e3499566f59f416f51dfc771a7fb882bc4aea2cfc6881845fabc3f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\4OMPIIY2.htm
    MD5

    ac47f7f20e86a6519ec3d3e11c2c90f9

    SHA1

    c7a380616693fe84626ad4f1c2a17d8ec3f621a5

    SHA256

    aef072c4b676ece347c0baee348260f9feb3fdb593e6bae39d07bea6fce74735

    SHA512

    195f2d8049fa5ceadd2ca61f8add6ca8c6c2399e7c57e2b3055d35275719dcbdaa6f3a558f28df5fa1ddd5dd375b9b1a3161acfcdb7412a54ab62a159b30e3b9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EU9ERU9I\7UWZMFAR.htm
    MD5

    3bb7af3855480af0ec75453e8e561f2b

    SHA1

    548a71602c90c1d85add636b792da7e39ac9a874

    SHA256

    516fadaa009b295a113450677fe4daa3bd931b1258390b5ee58fc2e949a48619

    SHA512

    ef5a3ea498eeaa7a8846aa193d238227a856835c55b105fe6aeee2a2f3c62491361ec8ff13911d3e9d5135a2122cfe6ee4df57c4ef65b33f1c96fa8ba2a9d271

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H29VF4Q1\HOQ4U9M8.htm
    MD5

    f7c55eeb9776b6510829d11a8b95e3bc

    SHA1

    a93fffcc18ddc876ff709fcfaf62409104740c45

    SHA256

    54cfe078064e5b806429883430fb331ef4798d1be96e585930263e821b6a4998

    SHA512

    6e5e508b6f76588d531dcd515958045b556edb9b19936016f5c8966690d45e0f6a3d4b596919376327055615620bfd2a696ff1eb93eff5426d31adcceb1b7db1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6SA50I93.txt
    MD5

    346fdf076a7b6eef2e3a27b82fb0222f

    SHA1

    54cb4a3959412b533aaf1ddd3d073ef9a0527def

    SHA256

    563e3d18186318419ef5ee8c1f0a3b88736541a366d940c13a986206d697d5c3

    SHA512

    963929f9ce7a9787e1f172d8fa339a36493f13fbdb9d52bfe7f6b4bd70ffcf2041c9e3036f24fef0206bceda553e9e6213a6cfa217f65eced88ef426451bd76f

  • memory/808-63-0x0000000000000000-mapping.dmp
  • memory/1540-55-0x0000000000000000-mapping.dmp
  • memory/1704-56-0x0000000000000000-mapping.dmp
  • memory/1836-60-0x0000000000000000-mapping.dmp
  • memory/1836-61-0x0000000001B20000-0x0000000001B80000-memory.dmp
    Filesize

    384KB

  • memory/1916-66-0x0000000000000000-mapping.dmp
  • memory/1920-58-0x0000000000000000-mapping.dmp