Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    01-12-2021 17:52

General

  • Target

    https://app.embluemail.com/Online/VON.aspx?data=7Nql1PaGjzBnSAsUJVTbhwXV1uNv74GRSs7iGNnrSynviRNBVY%2BwqnDFjJ1%2B8Nt7R1eHMg%2BTOp9Z0mU8QRzHncWos0fR3Y6%2BZ28AcVUHgk%2FZ%2F7BRbSJ2h4Fe%2Btl85Or7!-!S8HKsOdY0BTte5k0Xm0jPljae5MmjOkV7SYebcZxtbicOdbz/F+xI5pPyAYj1OlS

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand whatsapp.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://app.embluemail.com/Online/VON.aspx?data=7Nql1PaGjzBnSAsUJVTbhwXV1uNv74GRSs7iGNnrSynviRNBVY%2BwqnDFjJ1%2B8Nt7R1eHMg%2BTOp9Z0mU8QRzHncWos0fR3Y6%2BZ28AcVUHgk%2FZ%2F7BRbSJ2h4Fe%2Btl85Or7!-!S8HKsOdY0BTte5k0Xm0jPljae5MmjOkV7SYebcZxtbicOdbz/F+xI5pPyAYj1OlS
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2200
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:279554 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1160
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_4654C72C37F5FE1ED0B599A20772DCC9
    MD5

    d75eb76e2426f8dff8e1b33f5f9bcaf8

    SHA1

    412e82ec6469e0fdbb1e320a3762fc875f36da1a

    SHA256

    ae36fec3997d35cb8665b0402337e5165afdef82cef5a6486a71576a741f1bd9

    SHA512

    ffdef2ac45cc9e9f76f0bc595e19c7a9f08939ebde92747dd6115a1cb5def1cd42864602f59a58979d5981c1bef610d41fc9fa211e75821d7369c363abf74fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    234bef44f706cdbbef98f005d92b23dc

    SHA1

    f28a50d3e2f180e2c103f9646da6e3a674e2311b

    SHA256

    9f1ffe539c919cce9ae869dd2175f43b6097660946d5f2123c0a4bd1a3c40e84

    SHA512

    64ae1e0a05690d9e67a911d0bd8d01a699ce84630a2c488b6a8ee55a36321f0b0b3912d205f4e781c4c7f9e141ecfc87d95d0d58d7be21615ea75875ebedc8b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    5962dc30864bef23d5b7a05361235850

    SHA1

    b6fac91feda1b4c86ca618f57981ae94789d7b95

    SHA256

    785a209559fa9f7fa18dffffc3dd0792595ed5bb844f771c32f196ceabe722db

    SHA512

    77829bda245be17ab32303a961f7248960e6ac131fb8c45a5b7e983a2d062bdd3b023c431c190cfa72c7aaa6be54eb8fd25e996757adaf0eee0d8c0b6a8d4d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
    MD5

    d8927d05bc5c547ef3098559453e650a

    SHA1

    c0e42bb538e951856685513e5a6bddb3608a2976

    SHA256

    727dcc632816729354feeb09a1b0d210e7f82dbf05ed85ebb1f1d658ff0b1a73

    SHA512

    f13f155dfe57df50cd4bbc4ffe2f9cb5774b45cb9fa2c5c5b2a589d29e94af6bae318ffcc6185dfcfacc318708919800ce2ca1073f5230a62e611e2f97177327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_4654C72C37F5FE1ED0B599A20772DCC9
    MD5

    adff0ea1d84786d8028f66fdf91bf75d

    SHA1

    a754b2d648d0fa3a75f0509c4c480423a8ca7fdb

    SHA256

    6e11d7e2b30c841a4282c505d8dfa537e2c704632bb08c407db97e70a08f036b

    SHA512

    eec1256d84e2e5009c3698b400f5e5e6172b1c09d365f84ec695b96f88b0e5519e9a0f7942395ee7dee2383eb176917adadbc4461d7e9977c749982aca519561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    d70fda86d19a4da01dc8a415c1017647

    SHA1

    84b7dd068ee31410547773e87c6f136b63180e99

    SHA256

    28cc5982c4fd4a2f9bf3ea21a37074b8f9d6e1b68b3ba42e5bf83bed620bc307

    SHA512

    5fc9b51036f4512c41d21389f4fa31b91889f638397a293c8c3d6e163b386af904aef2d771d4fa2d0bb3c2332c60e38518fbc598673e9dfb37c2f3c3e7807fb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_86C2A03C133240EC4C95180B9FD368BB
    MD5

    0f4d985ea04fd13840e6a22b11b95e11

    SHA1

    50811be95f8655807e07ddf2c94c13d7252a6494

    SHA256

    023cc0d641d3901983602e0636a765bde5a1a20e60f303d4c2e06d0385496b0c

    SHA512

    6098a25cf57fd585e081cd05e90f268c2942c29bd2683709ca13b4e4fe776ed068113e44be099b3ef320ce6d15a9e259da4615af4020888e065e9c16eb0770f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
    MD5

    9664a399c25893cf52f2a016bf6be6c1

    SHA1

    1eda1424f502ec9e3d411bbe30b20dc2cf988b2a

    SHA256

    159c66f265e8cc1ea7007ae1052162d1be34bb7965e16f755d6ab4a29ef1f73c

    SHA512

    672e96af3dfcc95cc59c3783e58fb154aba66fd7985d935696df34aa4eaec177f07455aeb15bd7b7bf548fde4b8ce4afb64b3d36f1340c9fc4113e6075f52c0d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\21M674S3.cookie
    MD5

    91e1e8d15f0d1c514ef8c69919782a7c

    SHA1

    56815682b75471ab94efeeb3065bb4d51ed3fe0b

    SHA256

    e954dfeabc9dfb4915264949fb12bd1820e900676afdf45c3717be4ebaaa7279

    SHA512

    ba8b1b6fdb07a9af636b13594529025971f519f62d6dd2bcc98c9e8f637d6e6f586ccab283508537be8ddb3b8186ac91c39612b9d0142f3009864f9b4f8202ac

  • memory/1160-213-0x0000000000000000-mapping.dmp
  • memory/2200-143-0x0000000000000000-mapping.dmp
  • memory/2396-145-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-154-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-127-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-128-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-130-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-131-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-132-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-134-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-135-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-136-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-138-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-139-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-140-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-141-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-144-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-125-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-147-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-148-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-150-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-152-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-153-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-126-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-158-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-159-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-160-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-166-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-167-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-168-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-169-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-170-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-171-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-172-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-124-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-123-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-122-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-120-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-119-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-118-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-176-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-178-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-181-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB

  • memory/2396-182-0x00007FF94C6C0000-0x00007FF94C72B000-memory.dmp
    Filesize

    428KB