Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 05:38

General

  • Target

    52b4aa5b05aac2ef920aa286948b8b9051a5735d8b192d28a816b1b440cef1ff.exe

  • Size

    1.3MB

  • MD5

    b003052dd6986aea6c5343f05f588843

  • SHA1

    e9523b47bd04340e6231313fec26771347542b5a

  • SHA256

    52b4aa5b05aac2ef920aa286948b8b9051a5735d8b192d28a816b1b440cef1ff

  • SHA512

    70206dae01f9b887215dd7fc3564f380a5b012afd6da1722c46dbc846b90040b43b80a5c97538b149b5f1ad88460bd1f7214c065fc55e170443d8e4c28ded290

  • SSDEEP

    24576:szYXUY5BuVJl6aK0bTrzCXSk953Kwwn2uX3txhbg1GQHbfA7djwif96Jwr9HH3Iq:FkjVf6aK0bTe953v02kP01GmbAHQyr9V

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52b4aa5b05aac2ef920aa286948b8b9051a5735d8b192d28a816b1b440cef1ff.exe
    "C:\Users\Admin\AppData\Local\Temp\52b4aa5b05aac2ef920aa286948b8b9051a5735d8b192d28a816b1b440cef1ff.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1052
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1416 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    f226ef2711b0f5dbbfc032384826a7a7

    SHA1

    6bb0caa839c51ec85c56376457d82a7d02f6e383

    SHA256

    00ce75f5be523c8de9c0270a9abc2ffa69945b708d9ed1790f605332e7931cad

    SHA512

    605c4fb956e5bfdf40e706ad971f258f1493b64369667c2cbd12dd8b2d069cecbbe81f6289acaec7a18b015961678d053623f1064a313d05cb7ee1a463e3b709

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GTD9TYIX.txt

    Filesize

    603B

    MD5

    364cf63c1fdd1c42844e82ae0f680e27

    SHA1

    0f33a5feedf9bc687cfe065186ac8b8e3de80553

    SHA256

    f4cc686b15c8d9971c23e9f2a9c00eeb78eb653e7302dcde9a82356ee823b3c2

    SHA512

    d0178b8f7023bb6e071cd5321b5cbf00eab3daa95e1a4ec757f098f1fa7655bf9c35c3b2a7e845824d1327d57c5d8bcf0441edae63a52cb55c92218dfd51f923

  • memory/1052-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB