Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 19:06

General

  • Target

    0ff7d06645db256a3ca9b4ec8c602240d08d9fd2c52210364a356b2a6c331e37.exe

  • Size

    1.2MB

  • MD5

    0e37dbc17b52f40bec09f8e984b766f2

  • SHA1

    72ff7380dc31ec0dbbe3a08c32ae5e2268d98398

  • SHA256

    0ff7d06645db256a3ca9b4ec8c602240d08d9fd2c52210364a356b2a6c331e37

  • SHA512

    15948ead22d8bfd14712fb86a2ab6b55f766e50be5eac750c05c62c452d1efc23eeedfadebef0d4898ceadd69be3fd837450f64ade25e89e4c56f6c3b02b7869

  • SSDEEP

    12288:EaJmCEtQUKKGpOdn6HZqpR+oklRnAnvcvcx8nFGS13z81uoQb3WDb:E6mCEaiGcd6HApR92RnAsFGS13zrGDb

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff7d06645db256a3ca9b4ec8c602240d08d9fd2c52210364a356b2a6c331e37.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff7d06645db256a3ca9b4ec8c602240d08d9fd2c52210364a356b2a6c331e37.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.v258.net/list/list16.html?mmm
      2⤵
        PID:2024
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\hFoUP.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Windows\SysWOW64\expand.exe
          expand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"
          3⤵
          • Drops file in Program Files directory
          • Drops file in Windows directory
          PID:108
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v258.net/list/list16.html?mmm
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1928 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1568

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hFoUP.bat

      Filesize

      98B

      MD5

      ada787702460241a372c495dc53dbdcf

      SHA1

      da7d65ec9541fe9ed13b3531f38202f83b0ac96d

      SHA256

      0d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850

      SHA512

      c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WJ95LVZU.txt

      Filesize

      603B

      MD5

      6d85f78969e97b5bccc652c5032dccc5

      SHA1

      2588d1750d11fe12caf7b71c20dacf0f40f27202

      SHA256

      c9b0ec084d0ebfb4d0b0111f49fdf7d8d46a46cd7907133d3932efda6ca5b16e

      SHA512

      d09aa7135f63ea9cb2a65d46e9803afd77faac3d0c36607e7abdf376457634d226ce50e05af8648e2d5a869d7e0e548adea4636d3639f00524539517ca75fe51

    • \??\c:\users\admin\appdata\local\temp\ico.cab

      Filesize

      20KB

      MD5

      1319e9998cedc513c68fa6d590b6ad63

      SHA1

      ae95b333e88a13886994f320f5dfb4856168a710

      SHA256

      9a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb

      SHA512

      d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f

    • memory/992-54-0x0000000076561000-0x0000000076563000-memory.dmp

      Filesize

      8KB

    • memory/992-62-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/992-64-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/1028-63-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

      Filesize

      8KB

    • memory/2024-60-0x0000000074B31000-0x0000000074B33000-memory.dmp

      Filesize

      8KB