Analysis

  • max time kernel
    76s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2022 17:06

General

  • Target

    https://delisdemaria.com/on/tvaunslopi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://delisdemaria.com/on/tvaunslopi
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3300 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4900
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1820

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      6e49f7f1e7d5faf70613dcb484cc70e4

      SHA1

      b17a7107140658a4cab09549a23c78481a299026

      SHA256

      038c08b412582a9f36e5eb1f65c5786f84e5239f26e7534c790a777265657142

      SHA512

      98c3a2cac5680aa57680405185be9bcfb38ebc417007e0a911044b1b5aee96336c40eaac0c7a308cb2b3e3e2e3a37c3cdc685f998e2a99f40978588cee8f3fa2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      08d3f8116e8a040ac7a7ab1d3e5ccb9f

      SHA1

      268811569b361cbb3cd917df3ddb5acb59026988

      SHA256

      7fccb416d1a173fe1d0177fe4125a9f75e91b826ab5f147b7c163d6ed0e4b629

      SHA512

      1fbcc01b3f4d5cd20a91e75a60b017270bbc256964e5de849a8befe481f067d1a8b06988566d724b65331a98a5468db3cbda8d33f4fd484e7a30686622325a96

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G3YCTSQY\URmBNwj.zip.r0bf2nk.partial

      Filesize

      725KB

      MD5

      043b1155e0e6e3314d1aba1fe7ce033f

      SHA1

      404d2f997c655b123524e7c8486d1cdf9ad2c062

      SHA256

      ab8e591206425c6569d1210c0b607ff3879eb2c063c13d25d6a00572bd5fce5a

      SHA512

      0225d86ca5b540ab198bb80464b394d622161895494f63121df006cbf2fa55c38e62dbc7f7a9ac2938a4277551cb7bdf44a77994095c85bd51709945581c69aa