Analysis

  • max time kernel
    144s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-03-2023 00:45

General

  • Target

    https://soccer.sincsports.com/link.aspx?url=https%3A%2F%2Fchildcaresydney.com%2F%2Fauth%2Fnew%2F/7qll15///[email protected]

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://soccer.sincsports.com/link.aspx?url=https%3A%2F%2Fchildcaresydney.com%2F%2Fauth%2Fnew%2F/7qll15///[email protected]
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3624
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4ac 0x388
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\QHOSPQSH\soccer.sincsports[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\cz9baam\imagestore.dat

    Filesize

    1KB

    MD5

    07b52c5bc5f94e071659e46794afdd33

    SHA1

    8844841234bb77756931a81e384f1341d87bb7ab

    SHA256

    3d5db8d936aa74eb63cafcef564293db677003f3f7be367ccb5d79652ba23c90

    SHA512

    55f7a8f6d71a76346a136fbeb38830a137dc3a3989c309317efe8a76828c3f02577ba578398ab17197cfd65fb43a85d00bc40523a584c84d4ea3f3aeb4fb54c7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GPVLIKPI\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RP56V4OA\soccer[1].ico

    Filesize

    1KB

    MD5

    d6de4818058b8e1cecde190082408416

    SHA1

    c1af8722c82fe33649a17e2cf8889de72b6cba47

    SHA256

    36f8d056feb61d5f7fdb732d0a583cc9a81153492742c9e5b2dd6a5f378fa39c

    SHA512

    7b4d091839c02b394f59a5d8d8216cf416e5cdbd9bade4a51657813cafdedcc56ee19d83eb20825e718159fa56b609e0f4516e7b0fee35b5653c93254f80f517