Analysis
-
max time kernel
69s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 03:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=&redir_token=QUFFLUhqbWRsX1l6bFFoTVZxS0NhejBjQWFYdkZBbm1Nd3xBQ3Jtc0trNnhSd0tfb1g3OEZSQ3BJdFEzQi1QUi1la2t4X2NWejVQSXBKNUZvOFVpekhqVnQ2MFhjRkx6Q2t6eFVVQjVaMW5XakI1dFBVODFRU0NfTlhzM3VDeTVKMkxlaUE0T25BZW01eVRzMmN5SlJKSnJtWQ&q=https%3A%2F%2Fpsych2go.shop%2Fproducts%2Fpsych2go-plushie-pre-orders&v=9Wd9-LFCWvw
Resource
win10v2004-20230220-en
General
-
Target
https://www.youtube.com/redirect?event=&redir_token=QUFFLUhqbWRsX1l6bFFoTVZxS0NhejBjQWFYdkZBbm1Nd3xBQ3Jtc0trNnhSd0tfb1g3OEZSQ3BJdFEzQi1QUi1la2t4X2NWejVQSXBKNUZvOFVpekhqVnQ2MFhjRkx6Q2t6eFVVQjVaMW5XakI1dFBVODFRU0NfTlhzM3VDeTVKMkxlaUE0T25BZW01eVRzMmN5SlJKSnJtWQ&q=https%3A%2F%2Fpsych2go.shop%2Fproducts%2Fpsych2go-plushie-pre-orders&v=9Wd9-LFCWvw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3065666698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E1CF4213-E007-11ED-B7D7-4E963766237A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31028244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3065666698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c884d0db6b01394f84d012a5eedc1d2d000000000200000000001066000000010000200000007f7f91e5178de0279718f789e72021a008613f81dea184cb4bd8953c830d6e65000000000e80000000020000200000007870073d56aaa6e3d67672a7e3b4e336fdc8f24347eec3e64d3dcb9d7f367ea02000000026bf9178cbac3e7847e6402c28481d452fa9464df21453714bf0defadb09fc70400000009dd31090d87aedd2c8f48bf235282e6bd479089c4db679dab3e5e34847ec2483ad06d636c6cb09e48a9f5a78b656cbc951cbcd13e21167200c9e366e85ca5636 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31028244" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31028244" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3078167861" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4054dca81474d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388820973" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 iexplore.exe 1120 iexplore.exe 552 IEXPLORE.EXE 552 IEXPLORE.EXE 552 IEXPLORE.EXE 552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1120 wrote to memory of 552 1120 iexplore.exe 81 PID 1120 wrote to memory of 552 1120 iexplore.exe 81 PID 1120 wrote to memory of 552 1120 iexplore.exe 81
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/redirect?event=&redir_token=QUFFLUhqbWRsX1l6bFFoTVZxS0NhejBjQWFYdkZBbm1Nd3xBQ3Jtc0trNnhSd0tfb1g3OEZSQ3BJdFEzQi1QUi1la2t4X2NWejVQSXBKNUZvOFVpekhqVnQ2MFhjRkx6Q2t6eFVVQjVaMW5XakI1dFBVODFRU0NfTlhzM3VDeTVKMkxlaUE0T25BZW01eVRzMmN5SlJKSnJtWQ&q=https%3A%2F%2Fpsych2go.shop%2Fproducts%2Fpsych2go-plushie-pre-orders&v=9Wd9-LFCWvw1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b3190077c7c84e2cfa647d44e0d7babb
SHA1da898c8fe5d577196138df0b9857402ff931902a
SHA256ca611b5f7c0759d63dc8f7d2ad6040bbca506e6d3249d4deb6432a5c8fcb855b
SHA512f64b904af24f47cfd7967fcbe65adeb4379ae137e8cee5833134edf80729977f417f71b70174da3ac0ee26d34567c072e9f988a687b7d1e3331341cd4911df24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD59ba875b18b4e7e77afcad5241fd75629
SHA1f2b718c5c2aeee58c24114487b9cfc2765d6a8fa
SHA256ac73d375759e60acddb3d6b56bf17d93087dda05d7670218c8be2fca93c4c425
SHA5125ac7356e1ef756434cf4519c4214684247b8348436397b03f84e15bf1a0d6b9bd0bc88e0351ec845575407f976765229a18ae778dbcd87868a72095c9329c62f
-
Filesize
478B
MD56a2debbb81c506da579ff178e4dcfd89
SHA1e191edd03ab2194a34942a917403b210efe71d2f
SHA256d195e3195ecb7e1c6eeff0ca0f08c563b8c7274f3b0e47a1c5345986ec3cae3b
SHA5126a4bc8631dbb9386f8b5f4fd227b79338ca4bd590b9f686abc50202d7bffd5dd0dbff1d4ec8c6410b5019cfa369468d94396e0e24e2f3e8e10177faf7117f304
-
Filesize
1KB
MD520464cbdcb9a324768daf0bc28fd8eb3
SHA10b2df0548f8e81f5860d89f086958642739a2d21
SHA25695c9cdf8b4a1e3cdf8de3acead339ad229c1efec8bc2c5968fa0f37b448dd8f6
SHA51206b3ed681f91e66f91ff99498c00620117ff7db4ee2a93eb4a49b924b23ef36311ec35af3451a4aee02bfc7f79a41356a187f06a011098cdd81d9cf38e10aabb
-
Filesize
348B
MD53a880420311ad60097059ffc0fc53393
SHA17644b902864c4ba3604f61e0880e05da15ab464f
SHA256571c382651d6337cd5fa49c512d02f0f99d523a896b87175fb59c710e1fcbc7a
SHA512c16652970d04b7b76f7e7ef5a8d091984a13406cf7f5475cc3cfa3ecae3278c19be5494be39a8e549978b0675d1c70f69cc1413de9240487943d91965aff17d1
-
Filesize
1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
1KB
MD5f2a495d85735b9a0ac65deb19c129985
SHA1f2e22853e5da3e1017d5e1e319eeefe4f622e8c8
SHA2568bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d
SHA5126ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee