Resubmissions

21-04-2023 07:06

230421-hxatbsef39 1

21-04-2023 07:05

230421-hwkbdaef36 1

Analysis

  • max time kernel
    8s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2023 07:06

General

  • Target

    http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1&gtm=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=&currentp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" "http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1&gtm=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=&currentp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4"
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:680 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4324
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\f.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:4892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EY3KXMB3\f.txt.unmjtwl.partial

    Filesize

    43B

    MD5

    ad8b6f08655797587cdec719a94efe59

    SHA1

    182adf5a140796f81e930649d05654dbf22fd5b7

    SHA256

    77d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6

    SHA512

    519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\U4IULL1L\f[1].txt

    Filesize

    43B

    MD5

    ad8b6f08655797587cdec719a94efe59

    SHA1

    182adf5a140796f81e930649d05654dbf22fd5b7

    SHA256

    77d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6

    SHA512

    519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3