Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 13:26

General

  • Target

    d5566d1d04bafdac9b88d28a1c94635de1fe27bfcb0a0cfb8e24232a6df506c4.exe

  • Size

    494KB

  • MD5

    924e83ab82ff16592ff1a85367998f30

  • SHA1

    a29c7206669ac16b6ae48fe8c1f2b6062b13a670

  • SHA256

    d5566d1d04bafdac9b88d28a1c94635de1fe27bfcb0a0cfb8e24232a6df506c4

  • SHA512

    b5de3003a5692925a0389b5be37078786d2f78349849f257936a44d47523f4f6830365c9de6251ba6faa4765df859db915011d7349609aa2b527920b52c807a6

  • SSDEEP

    12288:stlYXU58CIrpxH/RV08yDGuGLgUo32tBBj0E0lkx25d:szYXU5Srph/AextBBNz6d

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5566d1d04bafdac9b88d28a1c94635de1fe27bfcb0a0cfb8e24232a6df506c4.exe
    "C:\Users\Admin\AppData\Local\Temp\d5566d1d04bafdac9b88d28a1c94635de1fe27bfcb0a0cfb8e24232a6df506c4.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:1968
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:3844
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3660 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      d3ff0edeee7d1ea5754d8a290ae01189

      SHA1

      253ee24a4776d30bac0aedd7ea213adea6acb6f9

      SHA256

      e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b

      SHA512

      ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      9a2517eb305ed44306e3fb499013ae53

      SHA1

      2074e74a5eb62602e9e0e581020de3c10fa5241d

      SHA256

      96fd46a1040c6e5708c8c3dbbe0aab925f74ba73d6fa1d1903f02d4068982504

      SHA512

      be91e9414afeee89bad7ad4ba2cb13cb168576a83401b3a57b05fc6dcecaf56ffb9d145040bcead824909c5f14a2652ce46d87ff7dcc0abfd6b3bea61c5ad8e7

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

      Filesize

      1KB

      MD5

      df10bfe85ebec73f0c8cad5265bd23b3

      SHA1

      bff86442c1ccecaf1a9712602a67736844f1e1ec

      SHA256

      628c5f42d5451b58062fe92a5fd087bd26d475b707a1999c443fee352ba28581

      SHA512

      3b5f4e85913c4fb601ce12045fdd9af5d26d7bc8e756b1bbb622ef2a2741ab0ea6bf98e9e5d1094675c63015120f0d852a256849f620a2d74b41b4b2a033ce4d