Analysis

  • max time kernel
    107s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 02:27

General

  • Target

    Fly.exe

  • Size

    2.0MB

  • MD5

    b84de037868a4478d8fd2aa4eadab1ae

  • SHA1

    0c42d5822185a1183a8c7a25c301e80fbdf12033

  • SHA256

    47befc5c8d57f2b9b6da77ae1567b70d0603203b1de990392028b95b99783836

  • SHA512

    47be135875a3accf2f6345eba802d00e46a4f0061aa5a46e47a32a429d191bd730ba80187d1f62992886b180a52369782c7bc3b160360c76483933de88e6026c

  • SSDEEP

    49152:Md6+1uwde1YvJbyT2Qd6+1uwde1YvJ4yTw:MwGuwIcQwGuwIf

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fly.exe
    "C:\Users\Admin\AppData\Local\Temp\Fly.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1436
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x520
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1140

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1436-54-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB

        • memory/1436-55-0x0000000074C10000-0x00000000751BB000-memory.dmp

          Filesize

          5.7MB

        • memory/1436-56-0x0000000074C10000-0x00000000751BB000-memory.dmp

          Filesize

          5.7MB

        • memory/1436-57-0x00000000022A9000-0x00000000022BA000-memory.dmp

          Filesize

          68KB

        • memory/1436-58-0x00000000022A9000-0x00000000022BA000-memory.dmp

          Filesize

          68KB