Resubmissions

29-12-2021 12:45

211229-py8v3sdddn 10

29-12-2021 11:51

211229-n1lb5addbm 8

29-12-2021 11:50

211229-nzsptaegg6 1

29-12-2021 11:24

211229-nh59ksege9 1

28-12-2021 11:54

211228-n21s7sdgg2 8

28-12-2021 11:53

211228-n2tpwscdbj 1

28-12-2021 11:51

211228-nz82sscdaq 1

28-12-2021 11:38

211228-nryk4acdal 10

28-12-2021 11:37

211228-nq735sdge9 1

Analysis

  • max time kernel
    1196s
  • max time network
    839s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-12-2021 11:24

General

  • Target

    https://www.youtube.com/channel/UCn2OJocEFxegDrjKZMIfnLw

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/channel/UCn2OJocEFxegDrjKZMIfnLw
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:380 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    15db92f949081e023a06f7d02f40f695

    SHA1

    60cd8de52ea74d724e0cbd256c31dea69e73c287

    SHA256

    3206408cb90db89503d37b4fdd4f7000dd31d798c1c8fd7d79e11b9e8a6172e9

    SHA512

    9fe75344ace1e820f7c26bb2c1c79bb6c8cca1cd6c1e31f04fe66d990804f98c660bb87d63d599918f75354307d9aff591cd082cb35640ff6e1d8fdac4fe7e1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    7d5d14f18aafa94ef07cdacf475a9924

    SHA1

    6797883ff99a34f8d72fa1932dd9bc5c3763d6e0

    SHA256

    3b2c0d7870ce9e0622704564c191d0facabd1a9397dc19925dd817ce3bf77dbd

    SHA512

    0cd23572bf5c0a8b9081056dcadf8e37bd07ec036b46c2c8c6d48ccc020b1ca9d77844861ddde284b59e4803d84a84603e7f1c8e63ace67eabd4bf08e76f7858

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_30F32374BEBB4A72181B36E407396E90
    MD5

    af9fb86733dbf8ef4e48cd64370f912f

    SHA1

    3da65fc54b3e10a9d70fdd395da191cce3e797e9

    SHA256

    61e10b5efc1f4180f8899828192242ef54de15c523c61749e56bb1a1c6ecafb0

    SHA512

    7294670497dbcff97ad331fcaa285151802b27ec65d1ca68bb52c1bd0c77f201c2b3f66991226ddf3e92bca0fc6de7e1be35cd5ad36e2ce1da3633052c116379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    64e9b8bb98e2303717538ce259bec57d

    SHA1

    2b07bf8e0d831da42760c54feff484635009c172

    SHA256

    76bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331

    SHA512

    8980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    MD5

    5a93ea1c15765d4d23098fe49ac4aabf

    SHA1

    7639421fe7c3a3f54867a5305fa5de6bc7b99196

    SHA256

    56623a217913a81199b0e6eb1a7ae782a71ac4bbd34061678a4c63573619457e

    SHA512

    e4b9d461629057b1b98110c70e4f5b39ea097700dda0b92ee1bdbca514e122eb2929ee8cd2a7654ddedb1479f6446a2860cc7790ad7ca382a369ed0082be28b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    9931c5ceb191c9a9b73154a67cf53a27

    SHA1

    f2ec381a17565baccd5fe840dad00579afe793aa

    SHA256

    3d029911c1d0677357963f2541061127672e9a0deac7c4355e352fb7a933df9f

    SHA512

    19fba1ad30d61795736df6ee9655f2d164f373c7b44b26abb0c8636f2fa9563653d256fdc2f1ec2a18d17516d183aac8843306303dd5056cc4840bd302afbec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_30F32374BEBB4A72181B36E407396E90
    MD5

    73c4e0beb947293c63b6d02204f8dad2

    SHA1

    59788202f1804d0072d41a52ffb1a99d4db17b91

    SHA256

    3d87988c5b2220c444cc4b8fca9b6a1ad533bb0e9096f8a4390005f57b16d9c9

    SHA512

    7ace4cfddd3e5d9e9a740bdd78687f115487f61390fb0292fc515db31dd8baae806fa64f38419e6cfcb9f6a7e5716fb687b9b1456a4951392caccef2df45b635

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    MD5

    de16247ebea81f0cc3a62e0b475d9989

    SHA1

    18f468f5a48c25a5d318377cdd28db2df343c7ea

    SHA256

    124e67c496646383dc86edb19e6768d71347f2654f20d01ce6b15ff6153564b5

    SHA512

    e0d2c3243d63f4e873f4ea080b63d0686e95155d0dca1eb444545c6d15d3f5ec518bdf23d2af7eb8421e3d52d991ed6b0bbbe5f0c4e0eb07a0c50c474bff5dd0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\YF0Z1EES.cookie
    MD5

    bcf051b64b2d651e0cf9d326196563ee

    SHA1

    509451c4803be569a1dacd236f9489cbb7f24309

    SHA256

    74a19d5de6b8c803cbb20d5cd8290a9d91b098829d859e9492cad7f05c698833

    SHA512

    de00ddfa192584593c2380f6279487f3d289899ac9fd57aa169b5e829b6624b2d5a04f0165c18f1cc1ea44ce651b953f41e2393ec3bc4fb63c9e4a09fc53549a

  • memory/380-149-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-171-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-128-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-129-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-131-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-132-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-133-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-135-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-136-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-137-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-138-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-116-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-141-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-142-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-144-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-145-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-147-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-115-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-150-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-151-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-155-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-156-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-157-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-163-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-164-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-165-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-166-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-167-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-168-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-169-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-125-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-127-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-172-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-176-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-175-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-124-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-123-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-122-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-121-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-120-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-119-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-183-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/380-117-0x00007FF8FF9A0000-0x00007FF8FFA0B000-memory.dmp
    Filesize

    428KB

  • memory/1208-140-0x0000000000000000-mapping.dmp