Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    13-06-2022 13:45

General

  • Target

    https://tobeings2.sakura.ne.jp/mt/sbab/sbb.ch_de.bahnhof-services_waehrend-der-reise/SwissPass.html

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://tobeings2.sakura.ne.jp/mt/sbab/sbb.ch_de.bahnhof-services_waehrend-der-reise/SwissPass.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:932 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4384
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:932 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4148

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    Filesize

    1KB

    MD5

    45150295b3a757ce0b312144ace9d4fa

    SHA1

    84a5fc1fe7d87a5cc1800fe9c2119382f055988d

    SHA256

    f07afdd2cbb77d7019f668e683d01585acebfb159331eec1c3849a6b96c0f4d4

    SHA512

    da3c227f08f056d43ddb2cb976ff3e48a0aa7fe20177b391d5e2b27277316dec39fc55a99f165227d898a5d5647596f6898cbe6844ec2b30352c0ff72184d171

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    3abc0a8790937f795a488ce6f4b010af

    SHA1

    1ec28317a7390b615073819cf32874e8c57e9d39

    SHA256

    027ba6cfa1664a9e34b02c0f81970a6feb213ec9b405c8488361ed23a9e1cb50

    SHA512

    f8a026477fa25c194825fbb4c9a470dffcf4a8b85f575128a90042b54c5c30b6aab1cd6f70625423b21c4383f1702124c838788f862cf3313e2088898198a4c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63
    Filesize

    434B

    MD5

    9b3e5b6ed3f8c73f3da6fe7ca216b9a5

    SHA1

    005c4f0fd8cb112b2a57616aaadafd13f511ee47

    SHA256

    f3ed40d691d6e7d331842a5d69128187494524dd4a56448c7a43fc666f6ed339

    SHA512

    059a70df3022d1245191ded908c2926df21747c193cac4f92eb44ba35fb4a468c74778274abb441d9da6cb9d6cf61acc86dd7a33177fd01a05f115dd1c3aad7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    0c410427f56a938c40ddce5965ecdbc6

    SHA1

    f6dda9c0c9e1f3160b8522d9f7eb1e1dd1b66bc4

    SHA256

    e8d3f03599a3653b6b30929e9baf77a848d0a1fb64c498ec24d3308dfa469125

    SHA512

    090d68e93c3dfe1a0d04d9ee384c94bd299b1b82c7f7adbfe10c6831f496afb5c9e8da9a50318e4d39f81d9126fc49f8830e28da0a3bb1dd1921c41c71c915ba

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    1KB

    MD5

    391ea177e5726b7787e92a337e64aa88

    SHA1

    4b2c6432211e6988b10b327fd36f712625593369

    SHA256

    ad664e104268fd8b7288ec19fb9cfa2a1171d0b7f519b2dbe38e303f2c18496f

    SHA512

    df1fae554647a723c8dcb35328dcbaa1178341a0c31fcbc8591fdac6cfce8c72ac2789c5ea16e9a351e683fde1d68583c63e323f8aafecc6c4ab15e1c72d1aeb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    35KB

    MD5

    41c96c3dbe43a45cc2a96cb5b8b81139

    SHA1

    832c0f983e41a765517fb0eed9778e466b7defa8

    SHA256

    4f318937f0f52741dae74d1fd63d4377bb8f2f8566bc5686619a674ae07aa082

    SHA512

    bbac245dd389d4f3bb7759f38c04f2e6c36ad717701148e614d729315900a8088b9ad4e04b586a989e5c3f586a753661ec6928b2c9e053918a38533dacf026f8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jnqp20o\imagestore.dat
    Filesize

    40KB

    MD5

    9fd80aff6efe3299ea50fc52899381d7

    SHA1

    17767ba9520583b9a9d55dc97fec51ba5d57605c

    SHA256

    2bb5448aa0987d44c2c9acaee25c8d052fdfbcc5bf8abd9f00b9a5f9d6685610

    SHA512

    594baf4616ce6517c3e1292e2b9fb63f86d1b281cd081f6aaf2b9226ae20ba50ae9d8e4be3ae792e3096134f9f187b49b501e063ceb424a81d464a19c00c9394