Analysis

  • max time kernel
    78s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 08:05

General

  • Target

    http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://delivery.itzmychoice.com/ZURNGFOSB?id=173480=IU9UVwFSUFpSGFZSDQMBU1FcBAYGCVQGB1NdVVZRVlQAUQFTVABUAwECAwYJAVpUUltOAllZWxxeUgF2QAhcCgxcEgdCCAsMTAddW0QBVAcFDQBUAA4HBAEEXQ8AV0kMFkcUXBlOAAcODURTSklMWERDXxpWUFpbUVJKVVwOGj43YSohcC43IF0NVkpOAw==&fl=CkcQFkVbS01VUgQFCgdMQlVVUQdbFkdHHVERWFc8QRYDXRcAUxNLAxIUHF5MXQ4SUVVTDRtUUFdyRA9fXQ1aEgNHDQlYTwcNDw==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4860

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    631B

    MD5

    38f881f3a073a20f6b215b338d664f52

    SHA1

    9da80c3ff4c1c1dbff8699923870ba26a61a9feb

    SHA256

    cbe0e13b55fa32d0bd7899d6bbad0c69d24cb11da9d53c2ce30d0d68895d5558

    SHA512

    353b0d1debe1e2f2ab706f9102af2da10989d58e65ace6b9641c40f909dc89f368c31aa0a4629265288aafe81c82a002e1235be83b9e32d155760d523ef950eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C
    Filesize

    242B

    MD5

    723d0e57c8e150fa737c0947ad27933b

    SHA1

    c80a41d72d907c5d61ee7a1c0230a4f698f183a1

    SHA256

    2942fa2a8691bad6a93c1df9a1b20228a7586059ea9bf319b2c56dcf6bebca95

    SHA512

    87fabf7576d53fd559c3dabbcb3c941271eba48d7a5e918c97d2d69fff1694cfc721f14a11313ed8e50b144beee2a743cd3b50f65c15ab128f79ee245c36cec5