Analysis

  • max time kernel
    137s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:31

General

  • Target

    f0ba8b6fdeb398728e711af61f519e7147edbd3a7f7b3dcd6298fee3cb49c81c.exe

  • Size

    36KB

  • MD5

    2616d7d613f977f6ca60bb04cd1b96b8

  • SHA1

    6d6e79733b6276cce54f373b90cf5dc4d9dd4035

  • SHA256

    f0ba8b6fdeb398728e711af61f519e7147edbd3a7f7b3dcd6298fee3cb49c81c

  • SHA512

    6f7459f04d3db3837d92695eb56dddff1067605cccc4a4d1cb11423defcf15e654c04d00a5a0d4bb830918641351d2a6e919931df0c252e25d147815a8132a3e

  • SSDEEP

    384:ivCakuVlQWgUD94S8e/tfF1We/alHmzTGf8BfvgmNLO:cNpyc5nXyQzTGfWgcS

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0ba8b6fdeb398728e711af61f519e7147edbd3a7f7b3dcd6298fee3cb49c81c.exe
    "C:\Users\Admin\AppData\Local\Temp\f0ba8b6fdeb398728e711af61f519e7147edbd3a7f7b3dcd6298fee3cb49c81c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\f0ba8b6fdeb398728e711af61f519e7147edbd3a7f7b3dcd6298fee3cb49c81c
      2⤵
        PID:2040
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1256-54-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1256-60-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1532-61-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmp

      Filesize

      8KB

    • memory/1532-62-0x00000000039C0000-0x00000000039D0000-memory.dmp

      Filesize

      64KB

    • memory/2040-57-0x0000000000000000-mapping.dmp

    • memory/2040-58-0x0000000075C61000-0x0000000075C63000-memory.dmp

      Filesize

      8KB

    • memory/2040-59-0x00000000744B1000-0x00000000744B3000-memory.dmp

      Filesize

      8KB