Analysis

  • max time kernel
    137s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 23:26

General

  • Target

    a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe

  • Size

    5.5MB

  • MD5

    b3863bbc73d91468ea53c31854185a25

  • SHA1

    3e6b51f04220771969c141edc17e07ed88bde7f8

  • SHA256

    a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586

  • SHA512

    ad7620e18047d1ea029e2a87444bd3918407a1e04b2e5d7e8fc4e9332a6fb8ff5f973b6af1cd8ee377fc3fbff1b14cd7db055c3bd378e39eb0702815d2041837

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe
    "C:\Users\Admin\AppData\Local\Temp\a9405413e223cfd90c9d8080ae5a77716304b8339687d5dfb34648397acfb586.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:3788
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:4684
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4772 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4204

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1dmutkj\imagestore.dat
      Filesize

      1KB

      MD5

      972b33cf45683a4d55e8247247c4a8d8

      SHA1

      525cdf272ed723270afd8446edfbba09df07fd71

      SHA256

      0a868d293d790c7f4b0d42e4dcd55e762dfeb0b078e811d129ddeb59af326cd7

      SHA512

      e08375c4aa6895e14ff7269dfe0bffbb8e9d4bbcc66421719bf4f27aab741bf2c38a08b55b7f46ca2d75965f0b22a0947ec4c7368c4ee1606d2fbe00cbe47fe8