Analysis
-
max time kernel
518s -
max time network
578s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2023 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=http://3r9QkGCbLjRtiu8.Goodyear.nutracollar.com/##Z3NyODE2M0Bnb29keWVhci5jb20=
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=http://3r9QkGCbLjRtiu8.Goodyear.nutracollar.com/##Z3NyODE2M0Bnb29keWVhci5jb20=
Resource
win10v2004-20221111-en
General
-
Target
https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=http://3r9QkGCbLjRtiu8.Goodyear.nutracollar.com/##Z3NyODE2M0Bnb29keWVhci5jb20=
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe Token: SeDebugPrivilege 4640 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 4640 firefox.exe 4640 firefox.exe 4640 firefox.exe 4640 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 4640 firefox.exe 4640 firefox.exe 4640 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4640 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4612 wrote to memory of 4640 4612 firefox.exe firefox.exe PID 4640 wrote to memory of 4608 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4608 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 2092 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe PID 4640 wrote to memory of 4204 4640 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=http://3r9QkGCbLjRtiu8.Goodyear.nutracollar.com/##Z3NyODE2M0Bnb29keWVhci5jb20=1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=http://3r9QkGCbLjRtiu8.Goodyear.nutracollar.com/##Z3NyODE2M0Bnb29keWVhci5jb20=2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.0.1457154333\1364441131" -parentBuildID 20200403170909 -prefsHandle 1688 -prefMapHandle 1680 -prefsLen 1 -prefMapSize 219944 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 1764 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.3.1214693450\1155838729" -childID 1 -isForBrowser -prefsHandle 2476 -prefMapHandle 2452 -prefsLen 112 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 2364 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4640.13.1420469639\1760880976" -childID 2 -isForBrowser -prefsHandle 3440 -prefMapHandle 3564 -prefsLen 6894 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4640 "\\.\pipe\gecko-crash-server-pipe.4640" 3580 tab3⤵