Analysis

  • max time kernel
    159s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 14:42

General

  • Target

    29ffd7a0b4ecd782d8944688219030fccdc8bba8c5a8115e68d82fc95f9df4ea.exe

  • Size

    449KB

  • MD5

    9057c09972e880e77c66d09067ac7847

  • SHA1

    dc198f1f211c2c3698df95ce83dfbc070598590e

  • SHA256

    29ffd7a0b4ecd782d8944688219030fccdc8bba8c5a8115e68d82fc95f9df4ea

  • SHA512

    bbf637931198bbd9b2f44e8dbbef94d772a7733d4e1f9c86de830a64ded5ca20e77744092ffe1698499e452a5f48ac116720bb74d964ea8f433d3da3f5f8f2f6

  • SSDEEP

    12288:q0+GxSV74cwpgpJq3m6qkdKEFOwrv7m+ed/f05wCDPSdptRlJFz:pxe8c8gp43NdZLref05wrfRlb

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ffd7a0b4ecd782d8944688219030fccdc8bba8c5a8115e68d82fc95f9df4ea.exe
    "C:\Users\Admin\AppData\Local\Temp\29ffd7a0b4ecd782d8944688219030fccdc8bba8c5a8115e68d82fc95f9df4ea.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3436 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\29FFD7~1.EXE
      2⤵
        PID:532

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/5116-132-0x0000000000400000-0x0000000000481000-memory.dmp

            Filesize

            516KB

          • memory/5116-136-0x0000000000400000-0x0000000000481000-memory.dmp

            Filesize

            516KB