Analysis

  • max time kernel
    86s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 23:50

General

  • Target

    8b08b92c711ed36c8ab4eca8e721df5db7be15ea01dc36392b282c614d579db4.exe

  • Size

    80KB

  • MD5

    01ea605a14034f0d6872d8b3d66c2392

  • SHA1

    b05aaaffd0ad274690a1934e060f0d54a5276074

  • SHA256

    8b08b92c711ed36c8ab4eca8e721df5db7be15ea01dc36392b282c614d579db4

  • SHA512

    b989d9fb0eda56d53523b735cc582904436884fcd6c059aa5bf7f35f540056561acf818457d59bb5bd0247403af3e65b053325c62b84206c2bdb767fd7267ae1

  • SSDEEP

    1536:6ktydJiBH5SlyVzvYJ+uEN6Jcs5gWxguVm0oE+eQt4+gcl:ZydJq5oyVzs+h0JF5xgSmjEd6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b08b92c711ed36c8ab4eca8e721df5db7be15ea01dc36392b282c614d579db4.exe
    "C:\Users\Admin\AppData\Local\Temp\8b08b92c711ed36c8ab4eca8e721df5db7be15ea01dc36392b282c614d579db4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DOWNLO~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DOWNLO~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:536
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1164

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DOWNLO~1.EXE

          Filesize

          4KB

          MD5

          45acfcc85b7dd5b9745539ec6a940150

          SHA1

          17b52f51ee59651da2d456a5143cbaeb38f79022

          SHA256

          99262213803455f5631e47a6b3cc41f7fc4232e84f103a7d619d219a863dd256

          SHA512

          82211e84ebcc66440585230e9f1cc00a8b70e4f6e234c64952eacca9a425d02c939d4fca1ea814d2dd1bda4b00f4d8b148ece6c43e759d05b69d3854c4f5c443

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\73UN0FDF.txt

          Filesize

          603B

          MD5

          b46423aea477c50402cfecd4f2bfd632

          SHA1

          85c3660ab25eb6e83e6d8a662de57b09750e7542

          SHA256

          ff9d64dfaf97e41a8257b4b746bfad94e144ec536890e01c22ae28a236107208

          SHA512

          72d658e96e9578bb48b8c0a132bd46f626adf460e15845a76d5efe9ba48424d54e0eb2e9b074d6fe95d0164fe77f5d7d4fedb0a7fedaa64b93087c4d88751055

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DOWNLO~1.EXE

          Filesize

          4KB

          MD5

          45acfcc85b7dd5b9745539ec6a940150

          SHA1

          17b52f51ee59651da2d456a5143cbaeb38f79022

          SHA256

          99262213803455f5631e47a6b3cc41f7fc4232e84f103a7d619d219a863dd256

          SHA512

          82211e84ebcc66440585230e9f1cc00a8b70e4f6e234c64952eacca9a425d02c939d4fca1ea814d2dd1bda4b00f4d8b148ece6c43e759d05b69d3854c4f5c443

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DOWNLO~1.EXE

          Filesize

          4KB

          MD5

          45acfcc85b7dd5b9745539ec6a940150

          SHA1

          17b52f51ee59651da2d456a5143cbaeb38f79022

          SHA256

          99262213803455f5631e47a6b3cc41f7fc4232e84f103a7d619d219a863dd256

          SHA512

          82211e84ebcc66440585230e9f1cc00a8b70e4f6e234c64952eacca9a425d02c939d4fca1ea814d2dd1bda4b00f4d8b148ece6c43e759d05b69d3854c4f5c443

        • memory/536-60-0x0000000013140000-0x0000000013142000-memory.dmp

          Filesize

          8KB

        • memory/768-59-0x0000000013140000-0x0000000013142000-memory.dmp

          Filesize

          8KB

        • memory/768-58-0x0000000013140000-0x0000000013142000-memory.dmp

          Filesize

          8KB