Analysis

  • max time kernel
    42s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-04-2022 18:55

General

  • Target

    8f71514ccf1775932afb57c030acbae07cddff0f00e5c121f9b121b29c461ef9.exe

  • Size

    882KB

  • MD5

    c9def610093255d0f56efbc440c6be61

  • SHA1

    a601db24033b7a442df8c4db3aa0ed10347326c1

  • SHA256

    8f71514ccf1775932afb57c030acbae07cddff0f00e5c121f9b121b29c461ef9

  • SHA512

    f9c6dcf94261ee8b67864f4e345c1bb79b08fa7311b71deecc585daf79645c06fa6f52e1338baa69da1459724e086032416bcc8637fa8b53f4d6363faf1a1e13

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f71514ccf1775932afb57c030acbae07cddff0f00e5c121f9b121b29c461ef9.exe
    "C:\Users\Admin\AppData\Local\Temp\8f71514ccf1775932afb57c030acbae07cddff0f00e5c121f9b121b29c461ef9.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1844

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1844-54-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp
    Filesize

    8KB