Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-12-2021 13:39

General

  • Target

    e197c583f57e6c560b576278233e3ab050e38aa9424a5d95b172de66f9cfe970.bin.exe

  • Size

    457KB

  • MD5

    11746ae92be83ba28b05272fe03780d6

  • SHA1

    7190a70241a58610a5f200daa253bc47b686a3d5

  • SHA256

    e197c583f57e6c560b576278233e3ab050e38aa9424a5d95b172de66f9cfe970

  • SHA512

    5a3af04725bcb03163f13891dda1583de96fb6ba9c156347b65c011735c882654f4adfa824f53f14a7049c48163ce6e45dd1c7f29b8f24555c3fe55e260fffaa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e197c583f57e6c560b576278233e3ab050e38aa9424a5d95b172de66f9cfe970.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\e197c583f57e6c560b576278233e3ab050e38aa9424a5d95b172de66f9cfe970.bin.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1400
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:406541 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V5X5LAD8.txt

    MD5

    6215fd532fa52898ccb40248c692a357

    SHA1

    0a960e695703e92c1ca4d9e8cd46216a5543c73f

    SHA256

    2f43cdfe588daae234cf357c9122b9fc3060c851fd99885aae761dadba15b690

    SHA512

    f024bacf087f1ed174dfa9a9838a7f06b33d5a5886d54d4bdf1284be007b985752c890b891b3164eaceb29dd7be5a97dfb133224a80510525b21e713644ad348

  • memory/856-54-0x0000000000000000-mapping.dmp

  • memory/1104-56-0x0000000000000000-mapping.dmp

  • memory/1400-53-0x0000000076C91000-0x0000000076C93000-memory.dmp

    Filesize

    8KB

  • memory/1400-55-0x0000000000110000-0x0000000000112000-memory.dmp

    Filesize

    8KB