Analysis

  • max time kernel
    64s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    17-04-2022 07:59

General

  • Target

    8ec249a6475d56ff7498f89e0cd593f0efdd027dacac72a29408d4ff949a0ed9.exe

  • Size

    880KB

  • MD5

    4405aaf5a84f8ceb89add3565aeb10aa

  • SHA1

    8d7b62e8ef50b8c016d18b304f03ed09ce2ef4d7

  • SHA256

    8ec249a6475d56ff7498f89e0cd593f0efdd027dacac72a29408d4ff949a0ed9

  • SHA512

    be5db985f6428d868e96ece87ce88cfcfba5aee8075aa31495412d65dd8f0b952c7ba8721de2df3a56a41f4f566f2efa6e7d0f3405bc9c46dbe99ce50574b0b0

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ec249a6475d56ff7498f89e0cd593f0efdd027dacac72a29408d4ff949a0ed9.exe
    "C:\Users\Admin\AppData\Local\Temp\8ec249a6475d56ff7498f89e0cd593f0efdd027dacac72a29408d4ff949a0ed9.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1044-54-0x000007FEFBC21000-0x000007FEFBC23000-memory.dmp
    Filesize

    8KB