Analysis

  • max time kernel
    130s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    14/07/2020, 15:07

General

  • Target

    RUN ME.exe

  • Size

    888KB

  • MD5

    323c3c28b793f084ede6cb8becb4c4d2

  • SHA1

    ca2bceb5658be20cbe08ca96a32dcccb22b98dcc

  • SHA256

    8a5c7b6b363eaeff989b00c2664a92831b00133064339208f69d050ff55f004a

  • SHA512

    376bc71a467060c5378a659ed5d21b96e1a18f6cb551e9a93cf290a2a6057e3a7fb0be0c4a9a01d0485dca0bc8450dd7228407ef1e51502efe9c9c13f0f55d44

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Checks whether UAC is enabled 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RUN ME.exe
    "C:\Users\Admin\AppData\Local\Temp\RUN ME.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1116
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Checks whether UAC is enabled
    PID:608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:608 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetWindowsHookEx
      • Checks whether UAC is enabled
      PID:1636
      • C:\Windows\SysWOW64\msdt.exe
        -modal 65890 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\Admin\AppData\Local\Temp\NDF60D4.tmp -ep NetworkDiagnosticsWeb
        3⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1768
  • C:\Windows\SysWOW64\sdiagnhost.exe
    C:\Windows\SysWOW64\sdiagnhost.exe -Embedding
    1⤵
      PID:1700

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1700-12-0x0000000005750000-0x0000000005754000-memory.dmp

            Filesize

            16KB

          • memory/1700-13-0x0000000005750000-0x0000000005754000-memory.dmp

            Filesize

            16KB

          • memory/1700-16-0x0000000005750000-0x0000000005754000-memory.dmp

            Filesize

            16KB

          • memory/1700-17-0x0000000005750000-0x0000000005754000-memory.dmp

            Filesize

            16KB