Resubmissions

19-12-2022 19:24

221219-x4p9xsfh24 6

19-12-2022 18:57

221219-xma4nsfg54 8

Analysis

  • max time kernel
    98s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2022 19:24

General

  • Target

    https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbG5xUFlocUJBR2sxQkpuMUVkSk1URUptQVZOUXxBQ3Jtc0trUll2WkV1MXZhSkF0Y0plOE8yOWFiakU0bVpGeDJxcWt5WUE3U2dvVXptN0VDUDhENXBLQUt0SlRYVi1KMlRKRVEzRG9tdHhzZnNTR29vdERrem9EaWh4SU1ic1FjZEg2VTUwMXM3NWRvVjRFcnFpOA&q=https%3A%2F%2Fgithub.com%2FEndermanch%2FMalwareDatabase%2Fraw%2Fmaster%2FNoEscape.zip&v=4oATWyMMH4A

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbG5xUFlocUJBR2sxQkpuMUVkSk1URUptQVZOUXxBQ3Jtc0trUll2WkV1MXZhSkF0Y0plOE8yOWFiakU0bVpGeDJxcWt5WUE3U2dvVXptN0VDUDhENXBLQUt0SlRYVi1KMlRKRVEzRG9tdHhzZnNTR29vdERrem9EaWh4SU1ic1FjZEg2VTUwMXM3NWRvVjRFcnFpOA&q=https%3A%2F%2Fgithub.com%2FEndermanch%2FMalwareDatabase%2Fraw%2Fmaster%2FNoEscape.zip&v=4oATWyMMH4A
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2436
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4068

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

      Filesize

      478B

      MD5

      689dc0487b2e5e7f5286f83c37a55375

      SHA1

      4e93e967136466b820b633c0b54ca069ab9e962c

      SHA256

      f55cc80f5f74a43b47f56c4f9ec984f9c78a6a6334eb24dcc7c9a632586b012a

      SHA512

      5b2d285106dea443c7bee454b920908fe824d8c1b2d2f2a233b42a1f0251cc1aa351eb162d9ff825e40126ce94994c2ccd5261dfc84651da1ae19f9e750fcf02

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DUHIRKGY\NoEscape.zip.xwkquer.partial

      Filesize

      616KB

      MD5

      ef4fdf65fc90bfda8d1d2ae6d20aff60

      SHA1

      9431227836440c78f12bfb2cb3247d59f4d4640b

      SHA256

      47f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8

      SHA512

      6f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9