Analysis

  • max time kernel
    67s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 08:05

General

  • Target

    http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    432bd01d6c68e8a3eacd8c2c3be6065f

    SHA1

    9348477c352d6b1594c329d7d5e08ed3483ac87b

    SHA256

    f879e8f9d73fd2998a0021c1c949521491d480ff989d8682861bee25530b5ba6

    SHA512

    92c1e4677e99fe83b17f34bb28df9bb291fb041312e1fe138ecf18163f2c49ace57d1f314498cd13a6d2242026f23f99a20d9ec2038b058b614fd48301ea758e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\M50UQ1G7.txt

    Filesize

    603B

    MD5

    b37c3e51b6a2fb4b7a8c7f92ecf3caf9

    SHA1

    ba1f5a7d40a0e902b1f6b32f23feaf96a10069ae

    SHA256

    0deb29cf5438c2eccaaad9947405ae7023c9ff34290492e093744a2cacdf311d

    SHA512

    c39663b54002b5063655066729f7137d736376cae25a5a0a3fc5b95704e58689e1fb6bc9096cc94cd24f6a014cf83866bb062cd3032a8a5f88b442e3c240b529