Analysis

  • max time kernel
    81s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 10:30

General

  • Target

    7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf.exe

  • Size

    160KB

  • MD5

    901c65e2e1aa83e8ff8a3d1a7a1afce5

  • SHA1

    7361b87f63cda7c725dc40379ee23922e79d06ca

  • SHA256

    7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf

  • SHA512

    cdce4dfcbcd8a003338d479c7131f5052805c56c1a24c7c52d6558e2220a5138a0292d1104dedc7e758db45c4f1798d61db698a03b200b6701306c4aac7b1677

  • SSDEEP

    3072:fOvbpp9s7w65i/rvxC8iWh1QSUdkn5glmICHY:fOvFp9s7mU8f1QVkn5EmICHY

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf.exe
    "C:\Users\Admin\AppData\Local\Temp\7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf.exe
      "C:\Users\Admin\AppData\Local\Temp\7cb754d7f73678e5729f7dbed91f3d2753cc1d3d9d2241ea3148d40a9e0e49cf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3GOGPW9K.txt

    Filesize

    608B

    MD5

    45ec924bacd1bd632eca0bb2c48bce31

    SHA1

    7657b94ac333b43a7f9b56500064dcd60d427e43

    SHA256

    a42d9f289ba810ff547561843983f6a4204af87ed8fc8eef01ec2bbe2c314eaa

    SHA512

    be53aa0182026c2583f67f632979d490b19eef5a017a14c2250a1c99bafbe7293a428433d02d61e7ac7a78f814c5d6ff0fa9d59e91fa5764af61d1434b30512f

  • memory/1968-89-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-93-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-61-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-63-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-95-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-68-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB

  • memory/1968-69-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-70-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-73-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-75-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-77-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-79-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-81-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-83-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-85-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-87-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-59-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-91-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-65-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-97-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-99-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-101-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-103-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-105-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-107-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-109-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-111-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-113-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-115-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-117-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-119-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-121-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-134-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1968-135-0x00000000002E0000-0x000000000032E000-memory.dmp

    Filesize

    312KB

  • memory/1968-57-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB