Analysis

  • max time kernel
    148s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 14:29

General

  • Target

    64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615.exe

  • Size

    94KB

  • MD5

    6b5f655dafa19c10ac14a3bd6b7801a0

  • SHA1

    4823c2b5fd78a8367c08999a28eed65ac13770b8

  • SHA256

    64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615

  • SHA512

    f5ecafcc46f4e9270f0223081bd2c097c35c9a0776f0faa4b5743443e080980bcd510b383f8d2d398eb548793ae27278d4b245bc8301f7db5ff47c7563c86aca

  • SSDEEP

    1536:Il5JfrGhh2RYeyXFsVnniLw8Fk3oeYWANim4L2c86prCj8PtLGo5:WX6hh2Rd+CVngFfqqc86O8PZz5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615.exe
    "C:\Users\Admin\AppData\Local\Temp\64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615.exe
      C:\Users\Admin\AppData\Local\Temp\64bbcdb858f4fd140e4d8c0b2d233db8c1d8a0b95d84765d4f008d84b5f57615.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Deletes itself
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3QI2SOOP.txt

    Filesize

    608B

    MD5

    374d7b5861caa9a094ac4a90c72a64f6

    SHA1

    8e0bae78719f13e103ba8ded2babec3a58db372f

    SHA256

    21ae1944b54fe1909e7a83d5647dfbf9f3c92e68131fa37b256804efa989b5da

    SHA512

    d3ed80a539954abfd2f9fcd9aaa6828acf32c18217e8961024dc581beaa889a79e2ea4e2bed98cb1f2cf3919e03bddae0f495fb98747b86ff4cd63d472e48250

  • memory/1752-72-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-91-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-58-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-60-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-62-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-64-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-67-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1752-68-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-93-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-74-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-76-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-78-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-82-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-84-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-86-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-80-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-55-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-88-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-69-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-97-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-95-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-99-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-101-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-103-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-105-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-107-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-109-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-111-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-113-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-117-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-121-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-119-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-115-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1752-133-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1752-134-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/2004-54-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB