Analysis

  • max time kernel
    62s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 21:29

General

  • Target

    1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe

  • Size

    153KB

  • MD5

    78dfd34a8c53b4bfa8ca09ee29b22581

  • SHA1

    2dada394b53e3d6089d01a9ba054e750d132e3db

  • SHA256

    1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe

  • SHA512

    33f0c3677a9fe4a4d0c3838469e713647f5cd9b0934fd8ebdc7bdd3b99d779268827bb7758d9864057139203891ff7650491c4d01fd0c6fe13f30cf5d0640c20

  • SSDEEP

    3072:OQbuO1AU2Oejqg8hEhTCI6t8TlXofGPo9St8WHxSD+09+S:Oou5+eOV+hG/tO9f8CA0S

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe
    "C:\Users\Admin\AppData\Local\Temp\1d6f4559515ce83af6711c66a881b678cb98bfd9f71892107e574aef72db60fe.exe"
    1⤵
      PID:3096
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:2460
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1412

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads