Analysis

  • max time kernel
    129s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 15:42

General

  • Target

    http://g55g-r7l8l.ondigitalocean.app/?phone=+1-888-223-3505&ref=http%3A%2F%2Fdealmoons.com&rezp=154692.

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://g55g-r7l8l.ondigitalocean.app/?phone=+1-888-223-3505&ref=http%3A%2F%2Fdealmoons.com&rezp=154692.
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:752
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f8 0x304
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:736

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    2385a464e17980d978246b6b59a60697

    SHA1

    ee57c16c00972abbea042066dbdd769fdb89571b

    SHA256

    88dabd9b9c2183dd69b01146358783b0dc0e24faf044331be565cfd26e1dee2a

    SHA512

    d85eaa2a9a0a4523eb87bd43bbe995d8658dce705024c316de12c9f9be0277ded1646a6667bd47eed337e2b790aab9760ddf2e501242c42f3d66f40c23042d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    7KB

    MD5

    64bd9a644bd182581368e3ce024dad9a

    SHA1

    1520bd16d65200bfa86d889eb88f4f62a65dd007

    SHA256

    5814095df174f580f08019718d2f8d05177276906620e36564588ba4b19ddfdb

    SHA512

    af1ec9959334ae377a1b199a44ec31a3cadc1273512f8a2644eb8b3b21f24d4afe1c0515a3bb685bd35a0856c2d6383504ee7e72ae67f87f3bda0a8ff91ec5db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    17eb4980eeedf80c369b9a8e69eb0321

    SHA1

    382b7c0e847fb0f514bdf869fc03c5be06299291

    SHA256

    3549cf71dc588a003169905c748349fee985b3cfb4fc7e5e2821de53aacf9f98

    SHA512

    bd42ffd93490dfc6d91749d2bffedcc711c1f7a38a8c5ad1cc69a9199e5ccf03b396ef52fcf7d77971f5f0b542bc070059847f1196b9a16d2a03416d3d6bff6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F
    Filesize

    232B

    MD5

    f1dd95dbfb78c158e0fe1e5c196a81ba

    SHA1

    7f616276e395ab99e7940bdc23c7c4b3596ffd76

    SHA256

    15dd80c975482a5e8c397696486cc48b0cc79f5983b9aabcf8dd09a7fb8bc9bd

    SHA512

    f31e2d4768ceec902dc003257e6a97eb986aa92bea54d1776807b8b492ed6a4e02b49208516eff69c63252a05ef56623db3c97bd030e224bbac8cdcc1ab92ce8