Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 06:31

General

  • Target

    255a55498e7437141b75af1dc8ed4c360e730bf7cb47685a4516766208d02a62.exe

  • Size

    450KB

  • MD5

    4c7acef0081e43853fcdb206354ad0eb

  • SHA1

    0adde7c3508911171b69b516050a3c0d8f9d568e

  • SHA256

    255a55498e7437141b75af1dc8ed4c360e730bf7cb47685a4516766208d02a62

  • SHA512

    18f4821b697d4f17ec77da0d380d0e4db956743dc9d0ecbd45bb2ce6300020d895e38811037b6f7632fe1562bf0bf7d902e03007d55b9baea9d99e69df6cc0bc

  • SSDEEP

    12288:mmAzVaYyftx4q4iyF5V50o1rHIK2aebdNf6ckSDMranaibkIe6:4vo4q9SaoHAbf6zSXaib5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\255a55498e7437141b75af1dc8ed4c360e730bf7cb47685a4516766208d02a62.exe
    "C:\Users\Admin\AppData\Local\Temp\255a55498e7437141b75af1dc8ed4c360e730bf7cb47685a4516766208d02a62.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baisou123.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    60KB

    MD5

    d15aaa7c9be910a9898260767e2490e1

    SHA1

    2090c53f8d9fc3fbdbafd3a1e4dc25520eb74388

    SHA256

    f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e

    SHA512

    7e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87ba205dff072bf52f76a01b07b8d3fd

    SHA1

    7962c35fdcafc90df4de4e5ac514f2f13392e2ba

    SHA256

    55d92d68b58ec340963b2ecf76c388fbb8f9ff24d37acd4042422817627ed4ea

    SHA512

    46ea1a1f45e5128fe1fe32911df3c60bc7e4ec8f5fc32d4d0031b5f8e1550f721db12a4299dc2e8e91cebe893d6603ad762a1c7dd72c4eb315a0dd0f1b06304a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KDR19LYO.txt

    Filesize

    603B

    MD5

    5c30db353ab9a3fcdc68d09fbc927e7d

    SHA1

    7bc1d97cdcf0391ba6a2f60e27e32c79094f9b8b

    SHA256

    ee61281f3872c50220f6997b1debd4e7bd9576aac87141eac859787929d29a8e

    SHA512

    6216628a4cdf52c2133283b5c9aa8c92da0523858d506841f3274afdab96a2bfac8769f79fe6ba60688fa7dfafe67d0f484d673eb26798877fee02a5afd9c06f

  • memory/2024-56-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/2024-57-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB