Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 12:43

General

  • Target

    c62c294f91e3973d950791d99874a97c7ae018cba795dc94c2a84506749426a5.exe

  • Size

    28KB

  • MD5

    935a18db907ac663070f559a343138b4

  • SHA1

    3840d5a8da088e45ae665797cc7e36c5dd45f446

  • SHA256

    c62c294f91e3973d950791d99874a97c7ae018cba795dc94c2a84506749426a5

  • SHA512

    7687537442762618e76ca1b1a8ccaba128b0f0c7926c93b50ff9fba9625a1bc2d6ff71f1ff8d79ce3d64db7f3e62a20ba055ffea8602f58d61ddb8da19d86800

  • SSDEEP

    384:30c+R59Tt7QTLdg+BmIoQcEYCfW4QY4UeTHOWJ+QjC2gCW1xkTRg2r7zsX1:3wR7T1Gqz9EhzEUvWJ+cCogE7w

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c62c294f91e3973d950791d99874a97c7ae018cba795dc94c2a84506749426a5.exe
    "C:\Users\Admin\AppData\Local\Temp\c62c294f91e3973d950791d99874a97c7ae018cba795dc94c2a84506749426a5.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:576
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:799748 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    340B

    MD5

    10e33d4c3f5c4d4a8df04ce91cbe42e4

    SHA1

    df644bb4b6906cf867ce0bd7a70ae0253434de58

    SHA256

    43c07e296ed6a3b00cfb6f05c08d60330313c47fe44de5b60f5db2b1806a3230

    SHA512

    69f71401394ae33250f7baca8628ff72eea8d7db882fa659f751dce3ec3ebccbe01eeeb00e49e96287cfb336dad2b799ed08bfd7677b24a37034dd833ac75bff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2Y2CQFHJ.txt

    Filesize

    120B

    MD5

    d2a03fe617f33b6271f884a9118acd18

    SHA1

    bb1dde1e2f190fa88d4e2a52c6b2c4660e8f8a33

    SHA256

    73ae8c85954b450e79a4184e57f44ffabcb8d930291e2299b319b598a067a4af

    SHA512

    28ab7b3b43f0a492a68c7c1c78da963dc46c623f0edf609537dd25e6c36dae8e1b8440a45c21c9f36c7aa49f9a16ca640451ca15c02996196fc0a96b6dd6c433

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QTY7GZ6K.txt

    Filesize

    601B

    MD5

    972a4b6fa468b46657b89f568e0fa364

    SHA1

    58c370e61bc56aad079c35a34145936fab9d4836

    SHA256

    c1c224dfb4b677783f89a809c709624c3489bd8cb350c7ac7d8fc4dc22c3a5f1

    SHA512

    3f9906658cc3d8eca1d7475308db99db37da79440680ab70d1cc4ef0ced4c3f5d3e84f28aac41b88d19186217de88fee3ad7c3908ebf1368e839c52e6b1bb4da

  • memory/576-54-0x0000000075911000-0x0000000075913000-memory.dmp

    Filesize

    8KB

  • memory/576-55-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB