Analysis

  • max time kernel
    76s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2022 15:11

General

  • Target

    CopySettings.exe

  • Size

    211KB

  • MD5

    fb8d41cd3f6546d93836c0eabcb695bc

  • SHA1

    bbf22cf7b89a1fbe1ed0c4fff0926ba07d8a8df3

  • SHA256

    1debb8311214ee09c5ded5f9403f665ca3eaf67b6afa6d8ab1174793ba6eba21

  • SHA512

    7e3c7899cc917275c177a941dcdb6cc7851c889e54f8fd2c956cc17a2b5629caf7715e43f5c63af211d4fb32c6d9b4f5b858e2400ac50e4e89d0d8f9e8cda5c8

  • SSDEEP

    3072:jxyjMffJq5h4uMXTfSP89fA0J9m7cl6ztgoN:j8l4uMXTf0Ms7c8zt9

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CopySettings.exe
    "C:\Users\Admin\AppData\Local\Temp\CopySettings.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.8&gui=true
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64ceb2518493649404fe7c7c88a83e94

    SHA1

    c998c6645fbcf2b0d59f4b57d60717cd2c77c6e6

    SHA256

    c09514cb42bfc92214daa0c9cdd0ad590a596de57cb7ebca9dadaa4d8e8cf226

    SHA512

    0ac200feccdc8278daddac482fbe4615afb1d8150644d5ae41a3012cc84fd1eaa1d915ba5700264453eb6ad687377fd4292775b1f714cb498ba61308767dd66b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9VZYABAX.txt

    Filesize

    608B

    MD5

    89b807b1ed9c759b8a7080f6f23526ea

    SHA1

    65da512b54bf822e66e13e31af33d13152085561

    SHA256

    a0e23e395653864f93341767baf76e2592309e44f58edafb1d11b8aeca728739

    SHA512

    f1888aa2bf2a153e0d8dcd43a13bb5be5159806c36a8dde8d3be2f662a4f40b9d62dfcaf66ca38ea037d178fd550e6791f791af3ce05f23947de0bdcff2358b3

  • memory/1324-54-0x000007FEFB781000-0x000007FEFB783000-memory.dmp

    Filesize

    8KB