Analysis

  • max time kernel
    134s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 18:38

General

  • Target

    f09697c50b4c5e8101b9c993c84fbb3c24de6691387ca7b893e66484a7aeefbb.exe

  • Size

    466KB

  • MD5

    8434b6117d08ad473d4ccf835f21d62b

  • SHA1

    a6d7a347e8cf733964673bbcde6c44f707854b5b

  • SHA256

    f09697c50b4c5e8101b9c993c84fbb3c24de6691387ca7b893e66484a7aeefbb

  • SHA512

    9dd9cec7dc9395be73345cb95b8913878972e6c562c502905ce1e351f070eedd63ef3c5309b9acb262c085f84797b65f5d41c314519b5bfa8aa7a1139ebacfb8

  • SSDEEP

    12288:KOfr3+AZz6vIlBP9S/hsbRbG8UvY15yjRnEhGMZhqGmbwJJ:bbf1lyhsb97nSjx0GIqGN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f09697c50b4c5e8101b9c993c84fbb3c24de6691387ca7b893e66484a7aeefbb.exe
    "C:\Users\Admin\AppData\Local\Temp\f09697c50b4c5e8101b9c993c84fbb3c24de6691387ca7b893e66484a7aeefbb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5028 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:392
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F09697~1.EXE
      2⤵
        PID:3028

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            a66314123c8c72372bcb8583a5400a95

            SHA1

            fc3e45060463c37775da0bd4a8920296d222753d

            SHA256

            657c92d95798fc5dad4272f3d6d71776737ac0bcdce4ac6864ca5532f2ccf34d

            SHA512

            d9f5c243b04d7b3fbbcb37c68c583db672390644500cfa4d58280048d9fde52c668fd67e84ecd6ace20b2813eefb756627adbd04a6f19719f6e907aa3fffe4f1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            434B

            MD5

            f0b0ae634bd7c5759e18e7ff4cee7362

            SHA1

            e2ff14bfb4c007c3f24cafe583cb95a27aaec3f9

            SHA256

            b06d8411fa7498c41bcbc60ae5b843a8a7fd80ff70875d41d172448876db89f8

            SHA512

            fd6ee2e8f8bdadbb43114fd03d5a0820734f3fc8e00fd3f1ffec6a7cbd04a4aee47b4d63cba667c44c579ed33d05436611ef57001a260b2ca37e432c705a5f3c

          • memory/1220-134-0x0000000000400000-0x0000000000488000-memory.dmp

            Filesize

            544KB

          • memory/1220-136-0x0000000000400000-0x0000000000488000-memory.dmp

            Filesize

            544KB