Analysis

  • max time kernel
    73s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/12/2022, 05:32

General

  • Target

    https://dearkeaton.com/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://dearkeaton.com/
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4800 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4688
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3dc 0x390
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3544

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          f858ba1a816dd020e5af93bff48aaa7c

          SHA1

          171a4e5f3fc126ed213d0cefcd64639f892cb31b

          SHA256

          e0cbc49b2de6d153786f381793895f2011f0f918cf9c17ccdc9fffa611546921

          SHA512

          fc2a6de8eaa89bdfd8b4efd951e1a06919db0a27fa3ff571804d0220c8ba4797021a162461dc7f065d91146219979f33a821d6b8ff862f88e4ef66871ed19d74

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          45c4583ca00101a6cfedb7800071fa3e

          SHA1

          ebbd996a46ef1e9419c32aa4ee291105312dc2f6

          SHA256

          0ab359ac5f1a360f5c8ac0a4740086deb54991a8e53adc7a316385dd3ecf5054

          SHA512

          464f39b1696958388b98e1726430f3bef2f6a7b07052926b25ac8ef92d526d32224b4dff972d991e8465a96336333024d5c78d8c6b3d6dae88925949d281561c

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

          Filesize

          2KB

          MD5

          4c9bc6c5d5f4b27e5174382ced884073

          SHA1

          265bdf73f63e3b926de4255d57d2d4bf50c0466e

          SHA256

          c8dba5ddbdf9a99ce76fb0d7941f749885c2b15878dc3beb9130e1e90a360638

          SHA512

          f586a5cd6e692890c95b50988d70e96c4a54aac659ce92ace5cb233f8a4e312d757c33956e00cf0f90e5e45f0266a9bfef8333e75d6749f0ffc1d42c5d1d0465