Analysis

  • max time kernel
    200s
  • max time network
    203s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-12-2022 02:16

General

  • Target

    https://ikoa-cf54f.firebaseapp.com/finishSignUp?cartId=aboqvj1t&linkPP=aHR0cHM6Ly9vay5tZS9xMEw2MQ%3D%3D&apiKey=AIzaSyDegLtqP1QIDBqF8AdwiVd62vRla3MY1e0&oobCode=crVJ9U2jP-uGLmjagEykbCJxw1wCv9uNMMN3BtQaYrMAAAGEo46p-w&mode=signIn&lang=ru

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://ikoa-cf54f.firebaseapp.com/finishSignUp?cartId=aboqvj1t&linkPP=aHR0cHM6Ly9vay5tZS9xMEw2MQ%3D%3D&apiKey=AIzaSyDegLtqP1QIDBqF8AdwiVd62vRla3MY1e0&oobCode=crVJ9U2jP-uGLmjagEykbCJxw1wCv9uNMMN3BtQaYrMAAAGEo46p-w&mode=signIn&lang=ru
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1724
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4372.0.997380416\1590409155" -parentBuildID 20200403170909 -prefsHandle 1552 -prefMapHandle 1544 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4372 "\\.\pipe\gecko-crash-server-pipe.4372" 1652 gpu
        3⤵
          PID:744
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4372.3.819535867\576958227" -childID 1 -isForBrowser -prefsHandle 2336 -prefMapHandle 2332 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4372 "\\.\pipe\gecko-crash-server-pipe.4372" 2344 tab
          3⤵
            PID:4340
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4372.13.1265300151\489957686" -childID 2 -isForBrowser -prefsHandle 3504 -prefMapHandle 3500 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4372 "\\.\pipe\gecko-crash-server-pipe.4372" 3468 tab
            3⤵
              PID:4228

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          dff28f86d6e163ffec6b9ecb9d4f5a26

          SHA1

          9547379496b2ff6c6f9d67738fa2308add044b49

          SHA256

          6633c7fa10b503c5736e426b9872954a3c87c8b386997ba38e072870e35a8885

          SHA512

          46c4420cbf2e6a7efd218c160737f340a48f6e3c571b4f37fed2fdc9849d5ac8663143ad071244d4c30b16db0811cf65e72ff7e92226039f23ea99b74b8d548f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          ef882f1932c9dd68c8afda2ebc27364b

          SHA1

          4593fc073e078220e8d3e5fb6cf205430119c058

          SHA256

          5144288105e9dfc259e9526551a92ff8f2edf2c15f395c4b3948930139bece23

          SHA512

          abed9efc412039e8364507af7c857e2bb88ded864ef4d7754e6b4ea4ea750217954a672efb3a6c663498858e5c7660a33b02891f0f0d2b11a9616bd7c138931c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13

          Filesize

          724B

          MD5

          c2b8d818b9f50cec7f6e36c8339706de

          SHA1

          7349d467eb76c1db706505f7b1b06fa630a3c99d

          SHA256

          f130c8e6a09836d838d7273b2c8bac823b3bc3b21d150343ea4b406aa4b399dd

          SHA512

          a2597ab221b44ff5e416788dea012bebf31852f172ff4f1c456fe3760ddf879b30ae812b49de62262c8f7db4ac5b89e423fb17062365721d77907a33c0fe8d73

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          fb42041f7c3c1dbfe2efd06a34d466e5

          SHA1

          00f0a0efd10a2ea5d8d1fcd6277b7b6b809abfb8

          SHA256

          78090f58c822068dbd5e11be070c3550a23d79992dd15d67d8a8e628ac8251c8

          SHA512

          d0408501f828352f0420debcca7a708a375ed4c9e9582119924ee1bc61e8b1dac2f8fd0a1f16cbfe53c9743067a2c48313274120cb218e133f0333bc3020dd34

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          25765d95fab3e91f9051ccc08a5e56f9

          SHA1

          997b4e316143b36377bb18b3e22da56b623db456

          SHA256

          ce24efc9305e9585bec95bd93b77fc2979ae0ddcc65ee1f8697e9c2dc28cb5e5

          SHA512

          22e11a39c3dba5c99eef4f1a0ba5ea08ccf7a922d7e9afa0681ae823301e31f49640f04bd59e58da8f937bc8a6707107579b4d8f87d5993af8e5a2bf60c55394

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13

          Filesize

          392B

          MD5

          5fedf816d3f679467fe82053fa5f8380

          SHA1

          5036363fe68f20fb2e86f32df6db9354c6fd280d

          SHA256

          fa7d501fbd89aaa9880547886c252ef8a37b3d6dd427a3232b3545c834c7855e

          SHA512

          1e15d1996b950409a53c285e3b502384fec299661c7ca60f50d8c0b6bf5f3eda5560ea0b8910fe0ab5664e0349d97df946a5e7ec1ca59d5f48dafa7242b970c0

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B0R15WUQ.cookie

          Filesize

          615B

          MD5

          00c534d50916ad8155e9515507883803

          SHA1

          ae389b9630d22b7fe73a6b7468ef0292292fc052

          SHA256

          405bb4f38ec7173a2206f59753597bc064f9463e4de03011b5dd408dbe9c656b

          SHA512

          bd847a10e7ffcdac59e9c1e8e2e778079ce8d3184701be98fe9ff6a6f870d39d910327d9e4b9878c4731c3187f4ad4d34a30d3cbde008711bd84bc03800604da

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U5G4IH2X.cookie

          Filesize

          615B

          MD5

          8736553eb0837a59eb5f7f788e42b333

          SHA1

          e31a3e37a5c6f58c4b3ad1123a656a043911efb9

          SHA256

          d8945ff3b75b9e609864d517e73ecf9ac828d47be53a04bfdcc997072e622f34

          SHA512

          b8c531b00c9a19995951b75f6d4619f0f3120c093555a1c3b9166c636fc60964633ddae9b3f7210effe326b8a17a3f585a04b5c77c61a7d5fe0ee9dfa3316b54