Analysis

  • max time kernel
    134s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 18:38

General

  • Target

    de463be19968da427adb6959cfdd881824367fe33c7690a3ab127333110eeb68.exe

  • Size

    450KB

  • MD5

    a375c10e2ee4931b672e2e9c494a24cc

  • SHA1

    bc0e7c844ad4768340d841b3d969341665707272

  • SHA256

    de463be19968da427adb6959cfdd881824367fe33c7690a3ab127333110eeb68

  • SHA512

    adff820202ed969dcc8e1232bd5b3798ee82d23aace9ed5249ffb1f8ae5c42c35b1cba5b54d7778ef332ce36a55696b460ae73fbc8cc98b0f65756ad6a3fcb15

  • SSDEEP

    12288:FXv0lohJn+mxb7N9ye9r4bxcZzVbhMLsXb8rGb2Zm2n:FV1+mhPy2e+RWFGb21

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de463be19968da427adb6959cfdd881824367fe33c7690a3ab127333110eeb68.exe
    "C:\Users\Admin\AppData\Local\Temp\de463be19968da427adb6959cfdd881824367fe33c7690a3ab127333110eeb68.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baisou123.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:652 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3412

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4828-132-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB

        • memory/4828-135-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB