Analysis

  • max time kernel
    71s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 10:42

General

  • Target

    04918a8a6aaa19886f47e053ee90ca88550251d9191d7ffb54c3e33192049c26.exe

  • Size

    16KB

  • MD5

    6d756a7c4a803089d984f7d01b73fb11

  • SHA1

    ccab825d9635f959a89a0172784242d79e3dbd08

  • SHA256

    04918a8a6aaa19886f47e053ee90ca88550251d9191d7ffb54c3e33192049c26

  • SHA512

    2654d163227a02d0aea1b9927c329eae76a62b3fff9cd7ea497276b8961509962514f3735c9fb92d3a95d0802d683667d27f20480aaf218e74a686ca645a9213

  • SSDEEP

    96:/lx54DI63uPPsh0ohC0yzf908yVsCR72w:/TWDImu8Thi3osw7f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04918a8a6aaa19886f47e053ee90ca88550251d9191d7ffb54c3e33192049c26.exe
    "C:\Users\Admin\AppData\Local\Temp\04918a8a6aaa19886f47e053ee90ca88550251d9191d7ffb54c3e33192049c26.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe "http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=2"
      2⤵
        PID:1632
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.netgy.com/cpm/10102/10194.jsp?s=11054&dm=2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:628

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C3PT9EU5.txt

            Filesize

            598B

            MD5

            1541ccf3c67f7ed941c68c6dd26fcb32

            SHA1

            758dc4afb61b68b4dcb0f014dca019cd192bf22c

            SHA256

            f11172215c6fac71e641396737f464b727e94af110e8f483da83a72f31aa709b

            SHA512

            6bca05f7cc91323d8476699236865b5dada08c216aedb70a38d363bc5d891e153f9716826c06f6519b21533a27a2b75e40e51a777e04734192d0c031a26c034e

          • memory/1632-57-0x00000000761F1000-0x00000000761F3000-memory.dmp

            Filesize

            8KB

          • memory/1632-58-0x0000000074D31000-0x0000000074D33000-memory.dmp

            Filesize

            8KB

          • memory/1756-59-0x000007FEFBF41000-0x000007FEFBF43000-memory.dmp

            Filesize

            8KB