Analysis

  • max time kernel
    123s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-12-2021 13:15

General

  • Target

    http://grup-mempersatubangsa.duckdns.org/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://grup-mempersatubangsa.duckdns.org/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3708 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3708 CREDAT:148482 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2556

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\35DDEDF268117918D1D277A171D8DF7B_ABDD8CA4BAB2F458C1BC01FE92E270B3
    MD5

    84f0faf26e4c67933753c1dad1d9a20e

    SHA1

    ddc1b0c191fa3871e51e3a109911acbddbf3787c

    SHA256

    bee35aaa7ce689768df666318df1ee8436ec122794ededfdf5b7f8ac4b11e446

    SHA512

    2e4d85d84a5d812ee00e8ba82abafdc0e17e90ac223b7e9d96bc1c6e37bedabf905d8dac003149cc78f21b4002775a9d3d27b2f7fae00073a3dfce78fdca7ffd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
    MD5

    385e2bc3f78c73bfe364c2558d72bd85

    SHA1

    ba8f45c51f2cd2756a9c5aaece914bdc77a3b29e

    SHA256

    7b9f0301705edafeee108c3030b9ea309ff81ab23022805435f49e89d9ef0aa7

    SHA512

    053156668070ecaa6de1bc0b52b638b6a369dfba932a2121d6bc31ffede2ea028da9b7be6bf2b33b04ea23483dfe825c0002618d8de84dcd4f9986af2f880fd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\35DDEDF268117918D1D277A171D8DF7B_ABDD8CA4BAB2F458C1BC01FE92E270B3
    MD5

    fe1e19d7689abac18f76bae3fbb4e752

    SHA1

    a00bc74591f3db7cf9c7e8c402951646431c1a26

    SHA256

    e3756c7bb35fd88b5e7d5d01644d76afe73150e63cbbdd20889d493c7a3fcf5f

    SHA512

    b8d014e459545bc4fa5222f5c08f29e351be9928a74aa1de677291696dd262c9d4c9b23bcc6ad24de5114ac809ac8e5036a4e72e45035404918735d238ec2bba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
    MD5

    60ae8e74b07baa520e07d3ebc5f896db

    SHA1

    57685699a370d94436584afe8cc0a9ff089399a3

    SHA256

    4254451b384ddcfd6358125875af59f8a61865e8600269aed7a86b00b5db2c35

    SHA512

    4700f415d3c42bc801447b2683f2d97ff9d5d7a105c6e8ab25b98125a5184c5f7e7c07b2745ff16e023f47320d7173c3e5187b2f936353dab9c4458f8144f3a8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZOLAZDXI.cookie
    MD5

    b17658ff4fd9bbd37dcb3ddf38f03963

    SHA1

    226580d85490d2376cf3d3b10de512b2e573f508

    SHA256

    5269f827d3d2befc7a7e20134ec53d7769f4b427875c0bd0088668bedede47dd

    SHA512

    782e66ee74def562b64dc3a14a02240a549456e25b6da19cd12c8f0e123e9bc1274ead89db333b5d8ee97070239aafbb945445f2b490e61ecd80ac0a759f6b8d

  • memory/2556-185-0x0000000000000000-mapping.dmp
  • memory/3708-145-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-150-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-124-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-125-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-127-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-128-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-129-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-131-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-132-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-133-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-135-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-136-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-137-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-138-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-116-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-141-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-142-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-144-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-115-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-147-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-149-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-123-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-151-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-155-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-156-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-157-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-163-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-164-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-165-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-166-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-167-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-168-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-169-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-173-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-175-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-176-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-179-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-122-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-121-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-120-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-119-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3708-117-0x00007FFB70E90000-0x00007FFB70EFB000-memory.dmp
    Filesize

    428KB

  • memory/3908-140-0x0000000000000000-mapping.dmp