Analysis

  • max time kernel
    87s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:43

General

  • Target

    b684808df6a6e3cc6a55b07f5107fe69ae766bd9264ff50df3079eec908e0bb3.exe

  • Size

    256KB

  • MD5

    5b1d595ba0e326c6afe5cd51c10ee0da

  • SHA1

    80b1ea920f5b4ebfedd553eee842197c0501a3dd

  • SHA256

    b684808df6a6e3cc6a55b07f5107fe69ae766bd9264ff50df3079eec908e0bb3

  • SHA512

    07038ab2752b5b1fc773ec0fc9369569a7c469af70013d6e51b4d81cd8e1e1ce0ca71da48bef1e3519ba934204ec9879eeb880037a5c9fdddc0c5738e2b422ac

  • SSDEEP

    6144:Votdk4t8BtqheJuEU/Z5XW/96HKwvTv77J:VALOBteeRU/zsUHf

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b684808df6a6e3cc6a55b07f5107fe69ae766bd9264ff50df3079eec908e0bb3.exe
    "C:\Users\Admin\AppData\Local\Temp\b684808df6a6e3cc6a55b07f5107fe69ae766bd9264ff50df3079eec908e0bb3.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1004-54-0x0000000075211000-0x0000000075213000-memory.dmp

    Filesize

    8KB