Analysis

  • max time kernel
    146s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 23:41

General

  • Target

    501176b2580c1d5a83b735e2a02cd9951976db3f2548cd922987def731fb19a2.exe

  • Size

    96KB

  • MD5

    43da37325f9dd657f52ce61ee4975e9f

  • SHA1

    a98a87bb01b4ebad04842037395b14ec2a95384d

  • SHA256

    501176b2580c1d5a83b735e2a02cd9951976db3f2548cd922987def731fb19a2

  • SHA512

    74bc9d1ea6c37c591915b348ffdee8dde65160a062b3528d6895775ea715294b0870464bd7db76b9dc2236c658dd21c546a75a207d0b11ae33fee799808c07fb

  • SSDEEP

    1536:YfUiAbz9nEhVfTEpaBBVRA/tlhVDT9p6mQ2eYd:Ysxbz9EXTzCtPVg2

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\501176b2580c1d5a83b735e2a02cd9951976db3f2548cd922987def731fb19a2.exe
    "C:\Users\Admin\AppData\Local\Temp\501176b2580c1d5a83b735e2a02cd9951976db3f2548cd922987def731fb19a2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down5.tian-kong.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:696
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\501176~1.EXE
      2⤵
      • Deletes itself
      PID:1888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N470OL9P.txt

    Filesize

    608B

    MD5

    3a8d5fd1be8f4f64804538c4a6d6f2e4

    SHA1

    46adbfa00bc270c05c56e742438fa50bcfed91d2

    SHA256

    8f489477700110c87dcc89e4c789e17527f4be2ddb5bec0eadedd89f7abf2078

    SHA512

    3d6ef7ff31c6ff3a8c76444158dd838cfca9c1f8331ae94911bb6aafbcf64e0d5ddba8ef54676abd63103759d9236fd6d3420a01a47ac8feb41fa18b1586efef

  • memory/860-56-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/860-58-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/1888-57-0x0000000000000000-mapping.dmp