Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-03-2023 21:09

General

  • Target

    https://trk-mkt.tason.com/CheckNew.html?A8PI9b7HGs1iTtAv24GgKOcbPF6qT1ciHFyceyuPwSkG==&j7jUKLzsw7wjhVcTX8mH1AQSNwJp7TMCR2=&j7jUKLzsw7wjhVcTX8mH1AQSNwJp7TMCR2==&UE9TVF9JRD0yMDE4MTIxNDEwMDAxMTY1MzMwOQ==&VEM9MjAxODEyMjg=&S0lORD1D&Q0lEPTAwMg==&URL=https://drlindawong.com/xzd/#YXJvYmxlc0B0ZGVjdWluc3VyYW5jZS5vcmc=

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://trk-mkt.tason.com/CheckNew.html?A8PI9b7HGs1iTtAv24GgKOcbPF6qT1ciHFyceyuPwSkG==&j7jUKLzsw7wjhVcTX8mH1AQSNwJp7TMCR2=&j7jUKLzsw7wjhVcTX8mH1AQSNwJp7TMCR2==&UE9TVF9JRD0yMDE4MTIxNDEwMDAxMTY1MzMwOQ==&VEM9MjAxODEyMjg=&S0lORD1D&Q0lEPTAwMg==&URL=https://drlindawong.com/xzd/#YXJvYmxlc0B0ZGVjdWluc3VyYW5jZS5vcmc=
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:400 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    ec8ff3b1ded0246437b1472c69dd1811

    SHA1

    d813e874c2524e3a7da6c466c67854ad16800326

    SHA256

    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

    SHA512

    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\45253D621EA9F2E0253B4AF8D44565CD_6AB890107DB45004A69A7D3A40697869

    Filesize

    1KB

    MD5

    00426fab0b122f8042f883da8ffc68d5

    SHA1

    95ca34ee487510d2457a7183c9623d928f291229

    SHA256

    cf69164c1b8f61641912b09c5b7fd4e3e7e26d10d192ebefe06699b251a9d1cc

    SHA512

    e1e838b6132366899934b7dd4c3721c7a1e5190f4ef03fa3636edf4efdc91e5756ddca3b33d48d47b3e8c4e07e4f76477923952c195124d5406990c65056e544

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    7e6edac4c08deaf3549189bfc3fb721d

    SHA1

    1bc71fc3691ec8fff202ef503f30c83673709055

    SHA256

    99600b86d6c324e84351dd8f09183150203c83df6188ff21104f3808e57adff9

    SHA512

    e5fe4d62400e6dd9d835111384b965a1ee33e72cf2f64724c22a535e133eb71196bce1566f9f2ed15c5965709e9e29c27bcf6744efc671bf406c9acd416946a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_BA1AB6C2BDFDF57799E8116E4002D001

    Filesize

    1KB

    MD5

    b482a462e6b12f82982a862dea100049

    SHA1

    32bafa4376ae3d674f64b8e23117f1dcac0643dd

    SHA256

    44433b25ffafb7c703e2f6c05c64281787bc7b97986f81bfb4034967c7d869df

    SHA512

    4e9bd96e2ca6b10b8284d9943bdcf2c5d145e7ea9998542ccdf83f13a5808416c210bf792838c993f823dcf07ac07e6ccbe5c5baf92308890aaf3d1b610ceea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    d4d72890b14abb57ec0a90fc75f2a82c

    SHA1

    6ccd0273981d2da1d4fc5a35598a1c27bc784226

    SHA256

    268e4079c41982b4e9384eeaadbd45027a34c8923a0a00c07d9148bc25ded51d

    SHA512

    5019151886ac562f347f14498146e7c1fc7dba6a65e9412b6be177b8ab70123a3ccfdd562d2ec2f7743aec5a047527eb3bb78704dd2297fa04c4a08d15592837

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\45253D621EA9F2E0253B4AF8D44565CD_6AB890107DB45004A69A7D3A40697869

    Filesize

    516B

    MD5

    c37652605c29ef34c9d8106690213a6f

    SHA1

    10602eae021fea4b6154707901698df5bc1cc851

    SHA256

    1c0d4f4250dcee0ee6b15f20777bc52fd9c86301fbc69c82a9b86d8b88f16fcd

    SHA512

    0d1c9fe4d83790468ace2d51d2f25efff9eaab87e611e9caaebd0e3c14da5ca785f6e83fb5ccec188c5c934da8f2c8b262dabb6b47f5591fce7493bbec375c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    e3be78dffae6086eef3112daa8eb81d9

    SHA1

    ed211a214421a34b38c225ac49518c892e0cae1d

    SHA256

    c5b19a18484f0950e5e3332b115a88ebb2ed7c94fb1533891b36c7836eef53ad

    SHA512

    0059f517dea8fd3860ec039a2dc4223feb5dcc68c1f2f53965355b71d8320e343f39577278c52fbe66bcccaaa5dcfdd1f372e25f319c482261ad2151b59cb8f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_BA1AB6C2BDFDF57799E8116E4002D001

    Filesize

    492B

    MD5

    fee29e7fa0848907d3cf998d547af2cd

    SHA1

    89a98114da22668402041c03c14f99b50750445a

    SHA256

    44a86e70cb976e4c93ed995651e445edc1853148d29b5e520dc2b3ea16303bf9

    SHA512

    51e99486cf4a96429cfdd8eb31ca6a87b567b8c1f5863f19fcbae4242ec12b16e1cbc82e0fd101af2b2f0a1224f00cea5e3c3660eed59883f980ee759cbb7fd7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver1434.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTLFUYWG\api[1].js

    Filesize

    13KB

    MD5

    ab6f5dad37138714b2b042e5135da1fa

    SHA1

    51c1790132750cce2efc080ec9f9ba0ecd8d4b40

    SHA256

    d395cc53363e6e22c75f73de0d4de7355ed844b65b8f0d149664ec06facd2d8e

    SHA512

    b5c63bca704d802e1b05a914fa23507a2e17020fab39bb5e9c061a9d6dcb611c7c587a6bc1e9fc67ddf9e54a76a93f4e666ca499747d40787b7f8c1eda117cb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTLFUYWG\challenges[1].css

    Filesize

    6KB

    MD5

    2c78b7f8fa496092bf41d5edd51611e7

    SHA1

    8b0b1b276e8194b0a5497db478ec2ea9b4f83c42

    SHA256

    2b0bd09c1cc7119d27e45353a59bf6c2721563e1689853ff704057a7439508d2

    SHA512

    53a7750ea46082968c2ec557857ad3975cddb0b45595259f0f3e9fc16360b87c5f257e058489ecaf80e61a97f92f1c5e34fa2f6fcfe922f4ae22392ffd75b4da

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TTLFUYWG\transparent[1].gif

    Filesize

    42B

    MD5

    d89746888da2d9510b64a9f031eaecd5

    SHA1

    d5fceb6532643d0d84ffe09c40c481ecdf59e15a

    SHA256

    ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

    SHA512

    d5da26b5d496edb0221df1a4057a8b0285d15592a8f8dc7016a294df37ed335f3fde6a2252962e0df38b62847f8b771463a0124ef3f84299f262ed9d9d3cee4c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\WJK12OD5.cookie

    Filesize

    447B

    MD5

    cc0cb3d8df9074f5bb4a5d55f03c8996

    SHA1

    0f6535f30847efd628cc43c253adfc58e24db2d7

    SHA256

    d5f1d5b162d755158dfd282cc1650384424820d3374f2eebf9677b9fae9db4a1

    SHA512

    921ff4471229c3c3872a26f70d9be4f99a3fffd7ca0d271aedc655dedc3fc3c930cf698a717fb6f61aa9d48eb31349f50613615c111ff529cb4883a655a1f738