Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 13:46

General

  • Target

    5f5871512189d9c30115df573f29ca909084fed9835797785dc49a82ae4ec89d.exe

  • Size

    36KB

  • MD5

    0898c84e92355d66cf47d29ddbbbeea0

  • SHA1

    b8b7161fac86adf6406d1c32381d06a92ec6e69a

  • SHA256

    5f5871512189d9c30115df573f29ca909084fed9835797785dc49a82ae4ec89d

  • SHA512

    d70f7ecab055952c78a682c7100c6611f2aba6ae4827e4f27dc37add1a362b0ce1b982d1513a746016aaa572193216523848eae1af9bf29370e81da652f0d765

  • SSDEEP

    768:/CcNtDnVp5Fo3jR7WdffEVbnn1MA18kHPbmuG9jR0E7:/fN+V7Wdf0bn1nbmuGxd7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f5871512189d9c30115df573f29ca909084fed9835797785dc49a82ae4ec89d.exe
    "C:\Users\Admin\AppData\Local\Temp\5f5871512189d9c30115df573f29ca909084fed9835797785dc49a82ae4ec89d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1420
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E12FC4A1-5DFB-11ED-A5BF-5242C1400D5F}.dat

    Filesize

    5KB

    MD5

    b75b32e22557890b9de4e852b480673f

    SHA1

    81726d0e3cce925fa2b2abbe1d20bf6fbb8b9a97

    SHA256

    ead2d9c3c4a70c6936a19eee212f0f0126700523fa5dc6a54d4e6ace5d3a7a5e

    SHA512

    acb1c7cda1d8f61025ff840f55d7dc59bd209089085001c3f3b414f09a32748289f6cfec94d0903ed905360899539d6c7c56e6e689425c5eb2a122c69d48bd7e

  • memory/1448-56-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB