Analysis

  • max time kernel
    79s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 08:19

General

  • Target

    http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4488 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4872

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    631B

    MD5

    38f881f3a073a20f6b215b338d664f52

    SHA1

    9da80c3ff4c1c1dbff8699923870ba26a61a9feb

    SHA256

    cbe0e13b55fa32d0bd7899d6bbad0c69d24cb11da9d53c2ce30d0d68895d5558

    SHA512

    353b0d1debe1e2f2ab706f9102af2da10989d58e65ace6b9641c40f909dc89f368c31aa0a4629265288aafe81c82a002e1235be83b9e32d155760d523ef950eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    242B

    MD5

    d85b89b1dea6ebbe71989847632d2170

    SHA1

    f461d271b18ddbbb49cf834c558ecf36d6565589

    SHA256

    3a8473c77527e09ce676aa1b1f2e1d9e8a8e40b2d71e0ddee205a32212583d9d

    SHA512

    50ba0db93f10ae657da4ec406b5bf55bac37b98d4972248edc5e805b044027cbe42f3decbe81bb5998b72b232b8f14280d52f12750d485b072fedee7e2b4c91e