Resubmissions

03-12-2022 11:44

221203-nv7m6sga35 10

03-12-2022 11:25

221203-njdkyseh59 1

Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-12-2022 11:44

General

  • Target

    https://www.gopusa.com/non-binary-biden-nuclear-official-charged-with-stealing-womans-2-3k-luggage-at-airport/

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.gopusa.com/non-binary-biden-nuclear-official-charged-with-stealing-womans-2-3k-luggage-at-airport/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3816
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3a4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4208

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    Filesize

    1KB

    MD5

    b6b20fc041e2d18a5b1412ea197e75e5

    SHA1

    ca55c4566c5fe6317fbd11901ec9318bb0471100

    SHA256

    98f196ce388b7c3522e220caea4f4f54a1aad36a941a00a2192e7c0d08c6022b

    SHA512

    070ddfa9c09962cf0bb0bc656084dcbf487ba9d272d95990b96754669440d4273ae7a8006fb1ef906451a14ef17b31f03f0c82af8ffe93f6df8d0561cdd0b594

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    0ff2da8bfc83bec6bce38ba6a3f7bf58

    SHA1

    84c37df7bed08d69f040c289676735c49a9564eb

    SHA256

    91026f24711c435d99a44884c7239ed1265cd17c0259a6c5885f69e4309421ea

    SHA512

    78afdc44d7557b2f14444182085252e8456c91289511d6f2abfd1d7273d05baba9a94206d370add716b9fc30dc326a1a2e1c78f642e926759d962cf216c3a489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_8DB596B9957E4DFDD69ACDB305306B95
    Filesize

    279B

    MD5

    b5936d197f43df03bb74d1c62a03731e

    SHA1

    e8072c338a22868836f2775a345561d9b4cc523e

    SHA256

    6962d5b1bed6e0a409bb999ac0a37b5823d7483e44561978031532c259e4269c

    SHA512

    477fd3ba89d6ace3be370e0168ab6a7d8e2d4be2431e0ee6d32e92a3e5a816b92dc2ac436a801ee33645bee11a42abb6f807deb5d0231713a7232aec5e297a92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
    Filesize

    471B

    MD5

    10a9f3076f6e26a27fbe42a98a87a4c7

    SHA1

    d2611e5324505b36890705c9886e551630db5232

    SHA256

    e23181b79a508fabe8cd3603fc9874bb7652f15f6a36760960334a0a50e64936

    SHA512

    ca9f35484afbd72ef21a67227a3059674fa46ae184b4d7d158bc36df6de70f11b29d221ed4d90683bd4d2f2b1ecb56bdbeb88d10f3273045dc7aff5dd7faf958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    Filesize

    408B

    MD5

    1092cafc76ec79934b223c18b64eb472

    SHA1

    baff5dbbb37a17e7790666923cf143652ce7b06b

    SHA256

    678c6d98e4c939e479536af32e768168d4fa78cfe68e2b8e0c9326076c9d4d85

    SHA512

    f2043a60ffb21b4ef87006963596287c3e7f4fe057e05739d21be2b814a9baebb226a3ed5bf038998d8b9b45303ea965113747ab639f4c06d88c86e8fc8f45b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    c23094e0498ad2e2114fdadc0b84d13d

    SHA1

    758c62f5eb2eb61326e24fca8d1a288d15ac5f80

    SHA256

    9d809761dd3a589cdc1641eab01858b15970033bedcee14bfe21b811b772cce6

    SHA512

    91da365df039824663135adda7f48160ae94417491a39083cd497d41f4d2201d7e00e936050d7e218b03735039aa07775c3f89245578bfa13738f5da539d61a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_8DB596B9957E4DFDD69ACDB305306B95
    Filesize

    430B

    MD5

    1132cf166f934c7bf86c1bf4c5bd5716

    SHA1

    191cfd9f9782082ea089436d7bc4a7608f060e0f

    SHA256

    c31d98ea17499c64549fb8006cf994d860c1052f3676b750ddc02d51af23f51a

    SHA512

    d982939d7308feec67f52f0652b7e18d491773d09799a1fcc4652715fbee061c8c3507e58186389dd3e15d96587b18666c71595020a817fa6f81b6a6a5c6537e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
    Filesize

    430B

    MD5

    1dff3a069cd60d205b22e70dee1a0010

    SHA1

    efe0553ab60a9d45680b8d814b8d2bc4e1b1159b

    SHA256

    01e1f1cc9ad54f739b98544093c9b7ba15cd28fc826def8075d1f0ac6ea2db80

    SHA512

    c6930e21e09dce106da384f3082f69a9a56b648215891939e5048b0b79501d96f61c55d2517eba21ed9df5806aa2be2598589abb6e2a1cbe44e2c01f92273daf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\19YHS5G5.cookie
    Filesize

    279B

    MD5

    c1fb87b327bfbc2eec0c6aab5dbfd19a

    SHA1

    5c305b6aa31d168211ef4daf022e530d60f48e31

    SHA256

    6c914aa116bc0ee297eacb4776e781c85d3d78580d48f6320d2b89ab0a7ff645

    SHA512

    1ce42a3933478f8499109694d9430c826b590e72712431e49fa01d68fd62173d49930c038aa2031abaf2334aeb9660eced73bcfe29d2a6a9d91368e607887d2c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1WAP0FI5.cookie
    Filesize

    1KB

    MD5

    6a10ef34181627824c60ea57f8952855

    SHA1

    f9f239d5436ce91f6318039f9a5bd47e65f72e07

    SHA256

    24ad8aefccfd256140e3df54fb40d1d997e7d790ffc4a47c7f97cae30992ea7b

    SHA512

    55bbaf3d1610d04f91689cff65eb10781a3ae911e3eadb8473b5d0421f48b19741973a2c81919cf8701ad1a87082e19e20981bb521666df27bc1ca11b5bbfc61

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8XXUDOJ4.cookie
    Filesize

    365B

    MD5

    d7e21c3db30cbb8e5b3240b6b5ec445e

    SHA1

    fc8f41d87c4f030c72573a0952287385ee43275c

    SHA256

    3ca39c862baac05edade90469221afcb1bd80b514e1ba0ae66c0d858e605a34b

    SHA512

    789968e93b1bc7ea33318b3b357f1596a12db0239f7ee6546f74a0411c1d67e24c21c1d79a47f72b5a95127643bb09d87b13cc07818bd19d2a82925817c5a0a7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CTVUQ8SS.cookie
    Filesize

    88B

    MD5

    b9339286d7eb868d8640bf717231b2c6

    SHA1

    39a82ef8f7690c37f363ddac9d358e0854e70d7a

    SHA256

    cbcfecf8e6aafe9cb38d56fc55a5911a8be9815d7318965012b083db662fb906

    SHA512

    f1534e1aaef83b943ed91ab01019fc4ab42483d6dff195423d7a1da5a9f6cbecc5ab0de621393235d68a95f97d3a7c8fcbdea8712dae3f7d4c62a25ab4066655

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\G8185NK0.cookie
    Filesize

    545B

    MD5

    b2b8119b82487b494e033660246311a0

    SHA1

    a407b7ff1b4dde0a315165219c05c8ab862c1104

    SHA256

    117d9de3a67caea9a1772ba1702f5a779bf5c8bc8b1979ed6bc0441afb85138b

    SHA512

    414b6e945a2881d894847e15b45f23313885d7dbd5fd3c4ad08fd3eaeec2d3ed3b713f55f0c3c0c6f55751a77858ba71dbf41e484874388f4b444a19f2a4e388

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QZ7NSRKX.cookie
    Filesize

    1KB

    MD5

    e711144292de887d1ed86eba38158ea8

    SHA1

    94dcef3c7e76e4ebada73f83a1d8669a52575708

    SHA256

    c35b0d958ecb293c89051ddc70f0cf2ba503ef8ed51ffa869bc1414f4f521640

    SHA512

    db3c98d34e90888ac95c1d2ceb3592f7b6a156df579d271a68ccb5cd0be9a8a00433d2f2ed579581131ac75b86e26282136542457f5ca1c860de6113ae5aa073

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\TVA4DNQE.cookie
    Filesize

    545B

    MD5

    932516f5e69b3c06bbb7def103fda426

    SHA1

    de376627c71e5b1d8e1f774de3b8e3c71a1400e3

    SHA256

    66ea10509b81976cc951d79099679a897badd7297ab3abffc36c6550abd565a9

    SHA512

    906cf746819b4bda10e39a78397279a31bcb42d7873864d49882c389a926633eafba30778641cee27fa87b07dfb1d147338b79b72b0d9ace1d2c66cd238759ee