Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 09:11

General

  • Target

    ab7f87468290201176301bd22fa96c0e971af7bf90cd1efa6630c0803803c130.exe

  • Size

    813KB

  • MD5

    01dd8c89acb54fbdfbe80e4e91ded366

  • SHA1

    4b2c7629441aadd1c2cb85aff9d1803c939c5ac1

  • SHA256

    ab7f87468290201176301bd22fa96c0e971af7bf90cd1efa6630c0803803c130

  • SHA512

    76c7ed254e6fc6b454adf269284a5892d9cb9439a1073c523dd44925a8981526b8d6f89eac3426e96d630a4e01ec02ce4dd9f0a1b8bfcc4d0104f89c6af025c9

  • SSDEEP

    12288:RePqLwRv4RyZ0SDFHchujqmv8Zn1T8PF2iRnKODYe7/bXC8ULpz+:2hHchujNMn1u21YJy8ULpz+

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab7f87468290201176301bd22fa96c0e971af7bf90cd1efa6630c0803803c130.exe
    "C:\Users\Admin\AppData\Local\Temp\ab7f87468290201176301bd22fa96c0e971af7bf90cd1efa6630c0803803c130.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1492

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1492-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB

        • memory/1492-55-0x0000000001F60000-0x00000000020E6000-memory.dmp

          Filesize

          1.5MB

        • memory/1492-62-0x0000000001F60000-0x00000000020E6000-memory.dmp

          Filesize

          1.5MB

        • memory/1492-63-0x0000000001F60000-0x00000000020E6000-memory.dmp

          Filesize

          1.5MB

        • memory/1492-64-0x0000000001F60000-0x00000000020E6000-memory.dmp

          Filesize

          1.5MB