Analysis

  • max time kernel
    40s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 06:12

General

  • Target

    aae3d82380e72a18724ea184162dab97c3a9ba06c4d99dd179d633adc9660a5e.exe

  • Size

    855KB

  • MD5

    eeac9ad429fa7a60febe1f8de53aadcf

  • SHA1

    062adee6533d9fd7222fdc78f3a6380315f55e5f

  • SHA256

    aae3d82380e72a18724ea184162dab97c3a9ba06c4d99dd179d633adc9660a5e

  • SHA512

    6100c84b316a1d434818d5b9834c9258db789cd1b443f3ed54fbc5e07353458d5707237a7980bed946e7e254f03c9ecb5c4595b1347f4dbfe9f1d02a0938b01a

  • SSDEEP

    12288:/Z4/avQy9NU85lJj1zbt5JajDw3/D6p4lQfpLxVtJkmXpvFeKX3vux10ifCoYsF:R4/aXNU85lJ1fB2p42xLxr/n81TnpF

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aae3d82380e72a18724ea184162dab97c3a9ba06c4d99dd179d633adc9660a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\aae3d82380e72a18724ea184162dab97c3a9ba06c4d99dd179d633adc9660a5e.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1408

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1408-54-0x00000000750A1000-0x00000000750A3000-memory.dmp

          Filesize

          8KB

        • memory/1408-55-0x0000000002270000-0x00000000023EF000-memory.dmp

          Filesize

          1.5MB

        • memory/1408-64-0x0000000002270000-0x00000000023EF000-memory.dmp

          Filesize

          1.5MB

        • memory/1408-63-0x0000000002270000-0x00000000023EF000-memory.dmp

          Filesize

          1.5MB

        • memory/1408-62-0x0000000002270000-0x00000000023EF000-memory.dmp

          Filesize

          1.5MB