Resubmissions

05-05-2021 16:30

210505-lda1w1hczj 1

05-05-2021 15:22

210505-prcssfb9m6 1

01-05-2021 12:52

210501-l7d8w6sgc6 1

Analysis

  • max time kernel
    136s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    01-05-2021 12:52

General

  • Target

    dd3d5489685e66249cacf412674d950efa255deac5808f1773bb0aeac0be9d42.bin.sample.exe

  • Size

    19KB

  • MD5

    5aac519e51e8d443bd6d50d8f4221ea0

  • SHA1

    2649e34827acbdd93913b39ab35011fab2830233

  • SHA256

    dd3d5489685e66249cacf412674d950efa255deac5808f1773bb0aeac0be9d42

  • SHA512

    9582fc5a96d696652064a831f7fe0296c36210fb34ca946182cddbbe4b95ea37ad18a8870283f7289e527ecaba04a736a93c1e0afd113b3ceb974a3192ce4bd2

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd3d5489685e66249cacf412674d950efa255deac5808f1773bb0aeac0be9d42.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\dd3d5489685e66249cacf412674d950efa255deac5808f1773bb0aeac0be9d42.bin.sample.exe"
    1⤵
      PID:1116
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:560

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/560-64-0x0000000000000000-mapping.dmp
    • memory/744-63-0x0000000000000000-mapping.dmp
    • memory/1116-59-0x00000000012C0000-0x00000000012C1000-memory.dmp
      Filesize

      4KB

    • memory/1116-61-0x00000000009F0000-0x00000000009F1000-memory.dmp
      Filesize

      4KB

    • memory/1116-62-0x00000000009F5000-0x0000000000A06000-memory.dmp
      Filesize

      68KB