Analysis

  • max time kernel
    4294196s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    12-03-2022 07:38

General

  • Target

    9321f161ad77d7aceacdfac498ee2f65dd2ef6dce819908bb44c424d406e9bb5.exe

  • Size

    552KB

  • MD5

    d38579402cd392fcf267654b9f18f663

  • SHA1

    c85f52559ffa3ba902a164f85a9c770d6b49da98

  • SHA256

    9321f161ad77d7aceacdfac498ee2f65dd2ef6dce819908bb44c424d406e9bb5

  • SHA512

    294add7ec0d57e57578a2b2eb06d492d69fde0e6a68d9c22ea66df7198d4f13925e063d83c9d70c6cc9674945177f73cb4676b326f13e96f06a09e59a3e1497a

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9321f161ad77d7aceacdfac498ee2f65dd2ef6dce819908bb44c424d406e9bb5.exe
    "C:\Users\Admin\AppData\Local\Temp\9321f161ad77d7aceacdfac498ee2f65dd2ef6dce819908bb44c424d406e9bb5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=9321f161ad77d7aceacdfac498ee2f65dd2ef6dce819908bb44c424d406e9bb5.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    MD5

    676786189c96a6f7a9e2d33f4cc7bb9f

    SHA1

    632223cca257a5d50427e5906635f51a6062f9f0

    SHA256

    38411015ac1e71f4ac2b837df553a44e2d9fc955f7abc801f1de046a8e573e8c

    SHA512

    806b57c46efe92184a8c4c39b4d5a71637702094c37767b9c6d5f7c62ae48bcd7aa67cd108295be946afba37695f7b4263a446adc63d7b338b2674aa1fe243aa

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\shpg9mq\imagestore.dat

    MD5

    0257a0ad046dedc5d8d58cb67ec913d4

    SHA1

    fd9baf892dcd47027b3b1397c0c83cf0ce86c86f

    SHA256

    15f4b90ee50dad23e20b17856bda4f8ab7b751f616a32124d4d96b5ac9d29744

    SHA512

    46ed85aa4c77e2e288cd3959ac8de51d2b942c64e8b8ddcb6053995369468b903ef1ab8703d21cd3a4e8c712bae7fde561562ce775c01d3d01fed46fc8b4d853

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W3GKNKJC.txt

    MD5

    bd81ae3a885028760fde91a6dc91217e

    SHA1

    f591338af18459814ef479ba162eb118f38d255a

    SHA256

    a8b1362dfc768d7a711964a2c9835471dce5f73b8aa744ec60a6d36eb50c4edc

    SHA512

    022471b7d811835e8203ea0ac3d948951b64461c6ec7f5969b39bbf205650accc2e69225828e38ddb5ef7a8c5e7dcc77b6b5495547557ec64cc8a9e4afa67dd1

  • memory/1040-54-0x0000000075E61000-0x0000000075E63000-memory.dmp

    Filesize

    8KB