Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 01:52

General

  • Target

    c17300d93b43a3bc4cedcda927567ca07156b97cf5af4d3def2e7b8a3bf39970.exe

  • Size

    238KB

  • MD5

    7cbd33d980f14f2e4e0980ee9b1ddcce

  • SHA1

    2fab7909a123f68ab9fa3108b203bae7c81180a5

  • SHA256

    c17300d93b43a3bc4cedcda927567ca07156b97cf5af4d3def2e7b8a3bf39970

  • SHA512

    993b8d60139d96ea340db1917453a058e4c796d80a5e2c51aca1d5294b3373377cd12782f71027d035160b3b61f3b9edf5f97d4a2b332240ae87335bcfe1038f

  • SSDEEP

    6144:o/JBlTb7kzQW7Xck6djCdtzie1PnzV4ikIicrB8Gf:8P/k4kSjCzBlV4ikILB8Gf

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c17300d93b43a3bc4cedcda927567ca07156b97cf5af4d3def2e7b8a3bf39970.exe
    "C:\Users\Admin\AppData\Local\Temp\c17300d93b43a3bc4cedcda927567ca07156b97cf5af4d3def2e7b8a3bf39970.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.455555.net/?an
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GOAB3QJD.txt

    Filesize

    603B

    MD5

    755d06314a41b7c52d6343574993053b

    SHA1

    a9baf3a202ff3d3e5dcb281f579ba656809a86d4

    SHA256

    a640ba8760d8598cd5ead577bc3fad83e068202f16743202b9a1b4113bd762fa

    SHA512

    fc1ff0a60d8c523691c4a861dbdf83be7445f0b0f94bc7b372d467f4e3aa5c63d0044a3d39372051e5bc1ea5c6c4b12179ea98b190376b141544b24b22603063

  • memory/1536-56-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1536-57-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB