Analysis

  • max time kernel
    124s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:33

General

  • Target

    3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc.exe

  • Size

    139KB

  • MD5

    1a6f580c6d097b0c5dd11beda4bb6447

  • SHA1

    39b7edae33318ca5960dea15c6cd53337789da29

  • SHA256

    3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc

  • SHA512

    40e8329e34dd0d893bf45c732f67f84accc931d4f7dfdfc2df8eac4f3bfd10cb56171085be5d5abf98c6c58aefd3551d10e76af8ed44ef15f8433e1a2c79f19f

  • SSDEEP

    3072:Il8X0rG3q/1/KNUv9DPwHSbi0i4VOXOAKfKwsaFjpOV:IOX0y3YIivqHSbFEOpgkk

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc.exe
    "C:\Users\Admin\AppData\Local\Temp\3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc.exe
      "C:\Users\Admin\AppData\Local\Temp\3a41c4467eb05fa493c1a348310f3983f091f5514edc5fe7f2a625e4363a40bc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U5ZNSP94.txt

    Filesize

    603B

    MD5

    12e2627005b8791f3431a57a47cc9340

    SHA1

    720cd62a9a1de3d6d2382d93639651e3e5f42408

    SHA256

    c4205af090ab55f3548c016c3c78017bb437352bebc99747a4bca00f051960bc

    SHA512

    074a5ed74dd393a79bc0e9d99b0296bcab1a594b9f557002ee8c9bb044b73b33919038bfc5232736fb2544d7a42d08546ed7d002884091872fb26e97ce3c54ea

  • memory/952-67-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/952-54-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1484-89-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-136-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-62-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-64-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-65-0x0000000000410910-mapping.dmp

  • memory/1484-58-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-68-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

    Filesize

    8KB

  • memory/1484-69-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-91-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-73-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-75-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-77-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-79-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-81-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-83-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-85-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-87-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-56-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-70-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-60-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-105-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-97-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-99-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-101-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-103-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-95-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-107-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-109-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-111-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-113-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-115-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-117-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-119-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-121-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-130-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-135-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1484-93-0x0000000000300000-0x000000000034F000-memory.dmp

    Filesize

    316KB

  • memory/1484-55-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB