Analysis

  • max time kernel
    4294203s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    23-03-2022 21:00

General

  • Target

    1.exe

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\EA30.tmp\EA41.tmp\EA42.bat C:\Users\Admin\AppData\Local\Temp\1.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/2bB2s6
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:436 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EA30.tmp\EA41.tmp\EA42.bat

    Filesize

    49B

    MD5

    76688da2afa9352238f6016e6be4cb97

    SHA1

    36fd1260f078209c83e49e7daaee3a635167a60f

    SHA256

    e365685ea938b12790a195383434d825f46c41c80469ce11b9765305780bff7a

    SHA512

    34659bf4de5c2cbd7cdc7309a48880ac2e1f19e0a4da0c1d4cc45658a81f9f4e7a9293be48e853de812a6b94e1caa3356a715a1a0c14d37b7ae99ba5888bd1df

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LEOVIYJY.txt

    Filesize

    608B

    MD5

    b2de67bb177af61709866debe79cd932

    SHA1

    4b7a510c0d7d270feb6676e5421288d90ed9b69c

    SHA256

    ad2a6242494b2debd2b1ea700788f60a3121a38bee11cf4ced665978d9bd7f0c

    SHA512

    106f0154eb94d9767b805ee460d46bd7570b595f57cbecafda923b8c3f2805262101ff4210e07d248b0f7a04261a511726e4597b541c25c9e8f3994a9433235d

  • memory/752-57-0x000007FEFB5A1000-0x000007FEFB5A3000-memory.dmp

    Filesize

    8KB

  • memory/1684-54-0x00000000750C1000-0x00000000750C3000-memory.dmp

    Filesize

    8KB