Analysis

  • max time kernel
    133s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 16:45

General

  • Target

    64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe

  • Size

    60KB

  • MD5

    124e413e40f45b52fb965cdc5818ede9

  • SHA1

    aa541b2ea3f21ca83c13b564e02131f67070655f

  • SHA256

    64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1

  • SHA512

    5aee8aa474417427f75d8294bc4c37034d5d820a145159a08460d8aa091b3cefea71f5d91d34966fb68c0bbfdc16f8c5efc08a3b5bfdcdfb5d44a4df63b610dc

  • SSDEEP

    768:C8BWhOJdF2zb/gspsWrpmLJ1N2v/QHTlHqnxQTuYHhLFRjHG8vkza:9JdFXdWAN1w/0JHqxQiYh7a8vEa

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe
    "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:876
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:1872
    • C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe
      "C:\Users\Admin\AppData\Local\Temp\64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=64b36c4fb46dbbba5bc43fb88563c70fd9a44a61c5f89a0a43967834f4906ef1.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:616 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O5HRC0GN.txt

    Filesize

    608B

    MD5

    8a02661aaa20a835b298fe20534efcb0

    SHA1

    16ef7895cdeefff18089b1a490582b69ef9d2207

    SHA256

    e99399b8e32452c69777e479bcd009d635fd36364acd1c58f30242f1b176aede

    SHA512

    46896e7dcb86c41c4e8f2956a5ded2f17d09035d46f1fcb55ff2f7e838ad44c23a57026528c4816080ccf3ed5d6611c6c1d02648acf0f7f97b07f0796fac6603

  • memory/876-58-0x0000000000000000-mapping.dmp

  • memory/1488-56-0x0000000000000000-mapping.dmp

  • memory/1496-57-0x0000000000000000-mapping.dmp

  • memory/1644-63-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1644-59-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1644-64-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1644-65-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1644-66-0x000000000040A12E-mapping.dmp

  • memory/1644-68-0x0000000000402000-0x000000000040A200-memory.dmp

    Filesize

    32KB

  • memory/1644-69-0x0000000000402000-0x000000000040A200-memory.dmp

    Filesize

    32KB

  • memory/1644-70-0x0000000076581000-0x0000000076583000-memory.dmp

    Filesize

    8KB

  • memory/1644-60-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1872-62-0x0000000000000000-mapping.dmp