Analysis

  • max time kernel
    107s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 12:29

General

  • Target

    548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe

  • Size

    103KB

  • MD5

    a1ba5dea6274aee54cf96ddb5fa97ba9

  • SHA1

    2cb5d67d10850aff4d9fcfca55dd81b74e79cb23

  • SHA256

    548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7

  • SHA512

    5cff394a39e97b85ab3b50dbf9bd65b0c04bb61960cd8cfe91f07089e9095a174b820e9ba27fb2f5a68f5da8b6154b496badfae32f56269f8a8917db4035dcd3

  • SSDEEP

    3072:hj5xNRXRkczNUoLc0/Y4qPrd6T9lxPqQ:bxRkczu1XtPx6vxy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe
    "C:\Users\Admin\AppData\Local\Temp\548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=548d267938c5743fd88e10b12b7203299de3dbfe9bb2b173ca177cbc018acaa7.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:872

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HDCL5QMR.txt

          Filesize

          608B

          MD5

          eca5b15e6e8e93ac236a3631d7b65b3a

          SHA1

          6868386fb9ae6d50f8f8037bf3d879ed93ea9421

          SHA256

          bc9a5ff1a2075dccfbda01f01292b9218e95a8cf728ccb8bec5f9bbca5097a2d

          SHA512

          1c2c9bc476231fe09cd7361115a6f1c2276620333db95cd97a444d67984790caf2f626f38b48764853abfa1ff0c278432f804bdc1effdd34cf4b09d559a46889

        • memory/2004-54-0x0000000044500000-0x0000000044554000-memory.dmp

          Filesize

          336KB

        • memory/2004-55-0x0000000075831000-0x0000000075833000-memory.dmp

          Filesize

          8KB