Analysis

  • max time kernel
    194s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 18:38

General

  • Target

    0ed0eef1437ca3e8208cdfc201372035228debc0c362803ff7d1837fedaa3522.exe

  • Size

    449KB

  • MD5

    83cd3c3eb4b822d859368ff517e48c4c

  • SHA1

    2840459122c3d8481318c15a5f39b6b8b77e5a67

  • SHA256

    0ed0eef1437ca3e8208cdfc201372035228debc0c362803ff7d1837fedaa3522

  • SHA512

    c6e680a64ad45d12f2b16d11c863ec5075fdf2907b60fef17b3eb7c7d40fc314b190c05099f61b97ac3c5f528d79cb94a4a1ebe3d7ecddf790663045e5dc4919

  • SSDEEP

    12288:q0+GxSV74cwpgpJq3m6qkdKEFOwrv7m+ed/f05wCDPSdptRlJFA:pxe8c8gp43NdZLref05wrfRlo

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ed0eef1437ca3e8208cdfc201372035228debc0c362803ff7d1837fedaa3522.exe
    "C:\Users\Admin\AppData\Local\Temp\0ed0eef1437ca3e8208cdfc201372035228debc0c362803ff7d1837fedaa3522.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.wa300.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1180
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\0ED0EE~1.EXE
      2⤵
      • Deletes itself
      PID:1224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IA4D55D9.txt

    Filesize

    608B

    MD5

    6eb864dfd248b5101999dbaa6c2d5d28

    SHA1

    70087220cb98706e9389ddcb131328190f89ef72

    SHA256

    29c1cb35bb2553ff46a97c13e3b9f241e3bbc7f86dace449c49e02ea76a98b8d

    SHA512

    a2e555f475d050e0231c9e8ae7b2b2f8e09d3429c3daef4aebc56042ee4b7c320172d03987a59f0831565b07a5278d07e36aa6aa22e2ac097d6bd53405966314

  • memory/1224-57-0x0000000000000000-mapping.dmp

  • memory/1708-55-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/1708-58-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB