Analysis

  • max time kernel
    113s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 07:19

General

  • Target

    3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe

  • Size

    68KB

  • MD5

    43fc4c875a37011d0d6ae0198754e52e

  • SHA1

    51045a17286ca97c9c459e9bcc790d5bc3a0f339

  • SHA256

    3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b

  • SHA512

    2db5d04763284a5fa250c4698b005f8d5b67b4cbd24248ed679e5ddeaeebe559c756e9172f520ef26917032a2cfeafc8a5dcbb87282184fb40d1d85c82b0e592

  • SSDEEP

    768:l8BWhOJdF2JMKPsv8TxTXnUUkq8I92V2oAL+drIsbM8p5JvzPasoxbBuS8NqZW/V:iJdFuEGdUy92QCdIsbVzasoluS8N44Ea

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe
    "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1392
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1416
    • C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe
      "C:\Users\Admin\AppData\Local\Temp\3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=3eef9670f1ad80d19f173f95cdca07228ab0b381b0808a1679ab5930c525753b.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:872

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

3
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1EHI9695.txt
    Filesize

    608B

    MD5

    b89ec60700af48e8ff9fa92a45e7b581

    SHA1

    5ecd88bd132a6aea3423ce28f2d700263c92682d

    SHA256

    21dcce2797f53d6e23ee3daa5a92ef3ad7469e7881e10fd6510755c7bdd7ad83

    SHA512

    94a123b88e9a2f4b1ecd140d52af7e24cef6918cad6111c606acde12134cdee435dd89fb0157df804f09774508022f74c4ed79acaa6945ae8f449d4eb7750036

  • memory/948-57-0x0000000000000000-mapping.dmp
  • memory/1392-69-0x0000000000000000-mapping.dmp
  • memory/1416-68-0x0000000000000000-mapping.dmp
  • memory/1500-63-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1500-62-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1500-64-0x000000000040C51E-mapping.dmp
  • memory/1500-67-0x0000000000402000-0x000000000040C600-memory.dmp
    Filesize

    41KB

  • memory/1500-66-0x0000000000402000-0x000000000040C600-memory.dmp
    Filesize

    41KB

  • memory/1500-61-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1500-59-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1500-70-0x0000000075BA1000-0x0000000075BA3000-memory.dmp
    Filesize

    8KB

  • memory/1500-58-0x0000000000400000-0x0000000000412000-memory.dmp
    Filesize

    72KB

  • memory/1752-56-0x0000000000000000-mapping.dmp