Analysis

  • max time kernel
    119s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2022 01:50

General

  • Target

    4123a4a455bafb46e128ad90547f442b474a9960823ec31bf8f0833ff9e37121.exe

  • Size

    461KB

  • MD5

    4873ecae999fd779ecaef8c436649285

  • SHA1

    94c6cf64e26ccd7a16aa8d1e067f90f347a5f32f

  • SHA256

    4123a4a455bafb46e128ad90547f442b474a9960823ec31bf8f0833ff9e37121

  • SHA512

    b1ccd944750a793da4b44d8c854bd755cae196ffe2cecdee68d995fb493b1648d903fce7bd440c180bbc59f0563ad1f06f1a3e548ccb677cb4f9d685b0bffa47

  • SSDEEP

    12288:9bzxG09kRLS0CQE83xYygA+PaAN8qnlNgKPKiYW3:93A5RLxEry9+iAmiDgKKib

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4123a4a455bafb46e128ad90547f442b474a9960823ec31bf8f0833ff9e37121.exe
    "C:\Users\Admin\AppData\Local\Temp\4123a4a455bafb46e128ad90547f442b474a9960823ec31bf8f0833ff9e37121.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4123A4~1.EXE
      2⤵
      • Deletes itself
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\C2CBHU7C.txt

    Filesize

    608B

    MD5

    6d72b21a8f3008cd9fb075557454fc01

    SHA1

    687ec8f4fbd0662c624291cb93e11aa00ccce7f3

    SHA256

    fff274baf63813e2117e65525eb8bcfc4adb3912bb640371cc43434008a39033

    SHA512

    b5746cda9518730a2568f26562b8ca518c51b8eca688f1aeb9708b33a3b65c2260a6fe0aa58b466c28e5fb4e3ad55287f8e94c9c60c7a5db536c4916b653ec01

  • memory/1328-57-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB