Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 16:58

General

  • Target

    c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe

  • Size

    58KB

  • MD5

    3333ca5007f8b5720927abea78295870

  • SHA1

    885f7fc4591dd88ff94b1dd198925b900ecbd772

  • SHA256

    c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c

  • SHA512

    8b051b09e21cbd3625b40697728d655943b46c31aee785d09e3c5fe6a82b50f009601f9e55c102391a32d8082ecaa432b5fdf7591d112375104459a527fbfd66

  • SSDEEP

    1536:mHMvi7ZSoqGS/vupyOsR5fg9jtR9IuZ70HbBvqki:mbTqDOWeRmq7AVCki

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe
    "C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\attrib.exe
      attrib +s +h "C:\Windows\system\ming9b090423.exe"
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:1116
    • C:\Windows\SysWOW64\attrib.exe
      attrib +s +h "C:\Windows\system\nb9ming32c090423.dll"
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:832
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:676 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:704
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c.exe"
      2⤵
      • Deletes itself
      PID:1104

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZH4U1IH0.txt

          Filesize

          608B

          MD5

          8557580ec78abbd4fec919469a54f7c1

          SHA1

          e5f458f658b003b09182fe7d028323e217809c27

          SHA256

          0cda4b313da7cb5300795bad13890a68d84e62c9ee82792517b41e7cb9ed524f

          SHA512

          915283e7f6866d84d792730a8c05e239c1834a6c7543e940d5d15deb0fda5c455bd57922e95a4de6252344e9392e1691017e5bddc87166d84f430d06523a6491

        • C:\Windows\system\ming9b090423.exe

          Filesize

          58KB

          MD5

          3333ca5007f8b5720927abea78295870

          SHA1

          885f7fc4591dd88ff94b1dd198925b900ecbd772

          SHA256

          c8a3103d94971343fa0e1be5f2b1aac9de63f7276c95a95bc9783a22a037009c

          SHA512

          8b051b09e21cbd3625b40697728d655943b46c31aee785d09e3c5fe6a82b50f009601f9e55c102391a32d8082ecaa432b5fdf7591d112375104459a527fbfd66

        • C:\Windows\system\nb9ming32c090423.dll

          Filesize

          108KB

          MD5

          45921247ff63cc91525920004f989276

          SHA1

          dc417f62a1184bf2de3b4058b47af14ec0a12bbc

          SHA256

          2a905605a173ac6f59e9de5bab1d6cc2da4612bc5cb33375e31c34e43455df75

          SHA512

          9dabba55870ce9da5b7189a8e25f124ba0c1c2e600d0b969b055d399008562e844706c80246c5e3238aff554ae9166ee10e80d88d8a8b1c4741685c14155fe3b