Analysis

  • max time kernel
    60s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 11:40

General

  • Target

    ab3f4fd651ae2d57c652b0cfde74774d4d246b213c2492bf5cc21a94744782ce.exe

  • Size

    893KB

  • MD5

    12ede310f2741243d64908bdf8d9e7b4

  • SHA1

    13b4411eddaf6a6e5712e74d8486e7bb559348d2

  • SHA256

    ab3f4fd651ae2d57c652b0cfde74774d4d246b213c2492bf5cc21a94744782ce

  • SHA512

    26e09b59a5aef9aa934d47dc0c0f4f95b4db5e1e7b50a088b3296cf09bad752ca7fcfc28c95275aef7fe0bcc6c9935f0bf7dbb88fc5d257b1b2cae574ec38d1e

  • SSDEEP

    24576:Z4fTaz+X/CMhIn1n0ibm+Itj/9gTNwei3:Z4fTaz+X/HOniibpst3

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab3f4fd651ae2d57c652b0cfde74774d4d246b213c2492bf5cc21a94744782ce.exe
    "C:\Users\Admin\AppData\Local\Temp\ab3f4fd651ae2d57c652b0cfde74774d4d246b213c2492bf5cc21a94744782ce.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1816-54-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

    Filesize

    8KB

  • memory/1816-55-0x0000000001FA0000-0x0000000002127000-memory.dmp

    Filesize

    1.5MB

  • memory/1816-62-0x0000000001FA0000-0x0000000002127000-memory.dmp

    Filesize

    1.5MB

  • memory/1816-63-0x0000000001FA0000-0x0000000002127000-memory.dmp

    Filesize

    1.5MB

  • memory/1816-64-0x0000000001FA0000-0x0000000002127000-memory.dmp

    Filesize

    1.5MB