Analysis

  • max time kernel
    167s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 15:21

General

  • Target

    5fcd0308a78a885c5f67027b0fa1481f7a18e0ed7e69b8e1be971eb070ff0c4f.exe

  • Size

    260KB

  • MD5

    6b7e0b1a5174d379e637ee4757def810

  • SHA1

    ae194b6b468b23f7b33c4fb16a67a37ebef01465

  • SHA256

    5fcd0308a78a885c5f67027b0fa1481f7a18e0ed7e69b8e1be971eb070ff0c4f

  • SHA512

    be8aa0b334fb04ccf564a4ff898c387b03ee7c1997e218780974d3213af0a9e1214bfd48a916d5dfd9851f7c7bc29a276db405be07e2770faf2298b36a2fcde4

  • SSDEEP

    3072:CK7lRzz/lpftcfTQeF7JKVFir8GKsoOiLSjEpxi1KoaPI9cYvEBWHPvAVYpYvEJm:fRzjl7+JSFirTK+mfpxi4FSH9I/Lz

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fcd0308a78a885c5f67027b0fa1481f7a18e0ed7e69b8e1be971eb070ff0c4f.exe
    "C:\Users\Admin\AppData\Local\Temp\5fcd0308a78a885c5f67027b0fa1481f7a18e0ed7e69b8e1be971eb070ff0c4f.exe"
    1⤵
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-54-0x0000000075021000-0x0000000075023000-memory.dmp

    Filesize

    8KB