Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 10:56

General

  • Target

    fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb.exe

  • Size

    506KB

  • MD5

    10f43cbc459394fbc8bd79a722da5173

  • SHA1

    9a1c8c8a1eb1c942c2351447ef846668c95286ea

  • SHA256

    fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb

  • SHA512

    a543b04aa240e94cc672fdac7e0c18d325ea2fec097b892fb455e28706255556b81020a5e9f1414332a4e3897273be5e62c3c131169e3dd71b0eee21d0fa889b

  • SSDEEP

    12288:IK18uSOzVoDWSNqHhJR4L8aq8NtIwanL4YcDUJN:IKrSnDW/fRgQh5L4pAJN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb.exe"
    1⤵
    • Drops file in Windows directory
    PID:1336
  • C:\Windows\helpserver.bat
    C:\Windows\helpserver.bat
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\System32\ie4uinit.exe
        "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
        3⤵
        • Drops file in System32 directory
        PID:1708
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\helpserver.bat

    Filesize

    506KB

    MD5

    10f43cbc459394fbc8bd79a722da5173

    SHA1

    9a1c8c8a1eb1c942c2351447ef846668c95286ea

    SHA256

    fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb

    SHA512

    a543b04aa240e94cc672fdac7e0c18d325ea2fec097b892fb455e28706255556b81020a5e9f1414332a4e3897273be5e62c3c131169e3dd71b0eee21d0fa889b

  • C:\Windows\helpserver.bat

    Filesize

    506KB

    MD5

    10f43cbc459394fbc8bd79a722da5173

    SHA1

    9a1c8c8a1eb1c942c2351447ef846668c95286ea

    SHA256

    fdd412b1b97dfd47e959430eb795a1d0d2975e38c49b2bfa44d9589b9885d6eb

    SHA512

    a543b04aa240e94cc672fdac7e0c18d325ea2fec097b892fb455e28706255556b81020a5e9f1414332a4e3897273be5e62c3c131169e3dd71b0eee21d0fa889b

  • memory/1708-57-0x000007FEFBB41000-0x000007FEFBB43000-memory.dmp

    Filesize

    8KB