Analysis

  • max time kernel
    89s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:27

General

  • Target

    https://minermundo.com/advert/soundtheory-gullfoss-v1-4-0-x64-vst-vst3-aax/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://minermundo.com/advert/soundtheory-gullfoss-v1-4-0-x64-vst-vst3-aax/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:17418 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:808
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:17432 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    ec8ff3b1ded0246437b1472c69dd1811

    SHA1

    d813e874c2524e3a7da6c466c67854ad16800326

    SHA256

    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

    SHA512

    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    9c094971a27ff86a263ae18cf5a0ff14

    SHA1

    368624fab92930f3edd9818b82341a152e72a162

    SHA256

    078a8257a7f0fe4fd6eb28f408e8ac24b0b018aaa023b37b1db23005ce91bd63

    SHA512

    236c9a1af251eb8175c25718f724fb564c6dd3aa48330641c0fa2bc2885c29d40f8cc504d1e68e5d9b4983760497b02aba396675deeaddeefce2214a3e6a82d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4

    Filesize

    472B

    MD5

    ae7674294f5a17ef8761b33ac4dad848

    SHA1

    30a771e623dd1e3cb8694bb5f71393aaa9e87b6a

    SHA256

    cac85ed50ce25c45d5093aaaa231a0d1cd9667f47bd2312947070ba202c5d96b

    SHA512

    ab4a0adbe606ac6b1b8c87fb24fa23c7fdd23fbdcfb616f24fe1269dd4d409c45d7b64cdf65b08caa13e88b4461b29d2bded7e197120a7f65a525c2c5e905a5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    1KB

    MD5

    822d01aab830e5cae8025db2c3f36ca4

    SHA1

    09e7e6accf68443d140b3fb502488879e3e2a5de

    SHA256

    c8ef7223b7feb7c48fa1a88d9f027e4e4f7e8c8f94eaf93fd82cb16034bb3a74

    SHA512

    6787bfb8c3d48229c1b7f68ae3f06396fa82aaad9b339ed2a399538df21aa2837f98b8990296ef9bb4f32347b2e300ffc0f9d8e17467a6d4be0d135f0775ba23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    416f43a5e5978e25d0b2b3804604f9eb

    SHA1

    71da8e406f52bb253c6b3932e24038dd593521a9

    SHA256

    457ae2aca2600e218804f138f83fb6f5ee451a0694cff806f97f15f5b00b1917

    SHA512

    0ece1d0ffa3cebd377155244da084f25206cda3ca499adf63eceab3b157598a2e290352120900563ece8938183b2a090dc527461eb4a197310abebb82103fecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    f569e1d183b84e8078dc456192127536

    SHA1

    30c537463eed902925300dd07a87d820a713753f

    SHA256

    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

    SHA512

    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_B49B51C2F61192D2C0D20E671D9EF51E

    Filesize

    472B

    MD5

    942e48a42959a84a8fb01744fd2caf86

    SHA1

    a3659e206ba81e8549afa2d9138060148883ba90

    SHA256

    7b84fbd99ebee52b8eb3b3d506ffc4ff9d15bd2bd211fc4003a20fe3ef171501

    SHA512

    924f681dd75a06bd57987ebdaa2dd7f5699dfbcc33388eb51368f907d583b40c8a62524a984550902d2b26831517c6aeb75683a3282f1bd5c256d80d55731138

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    7abc83af643e0f26b6ee36df452430df

    SHA1

    651bfd3460b93f28985a4d0fe084124b4b0f0c1d

    SHA256

    602159756cf5fdd04c3c33463cf351623d1bf741220dad30eb9dd52a85b4c6dc

    SHA512

    dfa65ab0a0e0406bb881889fdc6299cd992d32873e06171687058498ff489c9a23432009a0ecca5f9958ae5f931ada334bac215ee869f08388d8f03c1e4d05bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    c5498a875e8a857dc96436fbd72c20a6

    SHA1

    cbf73952c4b4b08016296cdc8c4e6611a648fcea

    SHA256

    dbc30c0904536eee3abede657379c06757b89b662eebff666a9f626fd5093838

    SHA512

    ea5ba399d00fe90c2feed484e61bd6c8c79ce59ee87857a268de0f342f3d17fb6c9b198833ae64bdeeb753751d704ced67081df140d3c9f36d744c43f1a53a3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4

    Filesize

    402B

    MD5

    3b10092a7577f890f010125b6935fb39

    SHA1

    427f5503654f0c1292b56dd4973f0780057173e5

    SHA256

    aab8960bc4748533a9c3577c45d5bf0b6d4b4be8f05a6a785c262e5910c01c04

    SHA512

    395d64f2a68e2f29391c21a2f8c87e08d1893c3bbc73006e87ff456900322ecb4a25d9cae5cb9dc1f63e13c755e8924727e74475595fbcb468cf2c0b878cb5cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

    Filesize

    438B

    MD5

    bf73e0a9fa92ef2ea166d2966aad2553

    SHA1

    e726ca014920b8beeb0e0208dc3669ae9ebd5fa0

    SHA256

    a8dbe2e0a423647218439e3e32f1d5854045f8a886966d7859cd366154378bad

    SHA512

    68a9d95dbc3a2b2de9b0278cfed73dd8cb863d925b52c6abbd4e99f20365da4890382a38484c82da3cb559a377d1385dc94d20827642a4ea52e0f13c47f21ac8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    1a3d1b9cc1c27e3164ea4414f3b51f74

    SHA1

    db3088b9b8be4b17c0e5b4b421f74d26800cc46d

    SHA256

    95a1ce2cbaed4b5e9aa2599b3953a36b4adfc4edb6c81763b94d4b209b032263

    SHA512

    d4ea9d8aaeeb505dc911b02aba03a417a138fd23317f86ee76c93a72cc8e134639697892255cfed3af5ebbe15db35b6b8260e5eba43ac3f02377481eb54c5860

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    fde6f5d4064ed71b8d989f327255be0b

    SHA1

    bbff196ef7a7d8a096c02e12ad1de21b1d73e4bf

    SHA256

    00024ddac3c046a63147ca511461b6f53815ec54ee081aa78b35816230a5a52f

    SHA512

    39432827f7c8a7a2d133ec7d2d2799c44dd2073ceacf0e8e6192036a67afc265ab6d26b5df3f430247e73c90b5a164a329c1f3aad4769199aaa9efb4dbf25b4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_B49B51C2F61192D2C0D20E671D9EF51E

    Filesize

    402B

    MD5

    5fcea5c2b61d4b5b99393f1ea1a1ce5f

    SHA1

    1ce2898fd99b0d1cd01453f5edaaf78a89ffdf2b

    SHA256

    d496d06edd8e0da96fe1b091db5d353fa9bad5aa80f0a604725df63bea0dc5ec

    SHA512

    509795d3ee853c2764c51edf87322e6a9823e061232dd016886ec443563043b5fbdedfbb2617a4cc4f8b61381bd6bce6ed9e659983b1dab2b48cfd29b3b897b4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

    Filesize

    15KB

    MD5

    1f211255cd154d43dd2597c5277503c8

    SHA1

    5b4c09f62724a64d3df363551510974ea7fa73e4

    SHA256

    049f7ff8bbff46b541d7b36d03b680d90f9ac310d10db1da8d65f47fdff8c60a

    SHA512

    76bc163784827a421bda526b43a75ee0dba1183318c7790f494e743c99eecf23086eec93f228b25fd4382999dd9b53af840238155c97574a928427946a5e9c3c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\favicon[1].ico

    Filesize

    14KB

    MD5

    d1f2445239520e7f32a9bc71df6ab4cb

    SHA1

    a2fefcf4bbaabc8a0646a3a26364e521b8a458f1

    SHA256

    312217201b042690fcbc693678b495d281e92cc8d35658e32f3e9bcb0358225a

    SHA512

    952bf7955772a9b686b9751f1fa49ca8e1293455acb9441d8e8aa1622325a88df463ec770206a3fe18a5bc07303a2258f89c2f18837a9899dd696c68be86e703