Analysis

  • max time kernel
    104s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 14:08

General

  • Target

    9297f766c167cbfbcf195a07e40673bad81a9f20a8b5fa001617569f32500e6e.exe

  • Size

    467KB

  • MD5

    769eaae3928abba5ed98c3f6999f721c

  • SHA1

    a4193270b916d489e90ebcfa467f947295a6dfbb

  • SHA256

    9297f766c167cbfbcf195a07e40673bad81a9f20a8b5fa001617569f32500e6e

  • SHA512

    3ce51b24e603d95f23f80d02ccdb7720e47260cbc2f8c288637df92aa354d909f87d26f452c0aff8e86788689e67c65f798c290f04fa2e4e9e8e00d8e63a1ca2

  • SSDEEP

    12288:GMDtCi7NFlZnNqZ9xGrLpZ0ZHEqtgb0U6:FplNFgxG5eZngb01

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9297f766c167cbfbcf195a07e40673bad81a9f20a8b5fa001617569f32500e6e.exe
    "C:\Users\Admin\AppData\Local\Temp\9297f766c167cbfbcf195a07e40673bad81a9f20a8b5fa001617569f32500e6e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl3
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9297F7~1.EXE
      2⤵
        PID:1856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E3X1T3Z6.txt

      Filesize

      608B

      MD5

      aa01e1c983262bfb746a2fdb18e478c7

      SHA1

      b02b977656125c6bd7944e8e60ee032c78435af8

      SHA256

      af6028ad1d560673227f846656ca83d81db8ce8033acd98c849fba0f84684c5e

      SHA512

      54a36a9fb945da500046c66945986b9ea1c03eb4324decb8d163e27ee5ae61f346bc559898f6055baca38699fcc1e9e056ef4dcd47fe0e2a232f564d2a71a113

    • memory/964-56-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/964-58-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/1856-57-0x0000000000000000-mapping.dmp