Analysis

  • max time kernel
    139s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 09:34

General

  • Target

    af9696ddb65ef01b496f0a69e308f213b2a4effa07659f81edf6445d92c56577.exe

  • Size

    471KB

  • MD5

    ad131cba995cc276bec99ab6a2414822

  • SHA1

    d4280259a51995bde6c1efdcc35dd633b3d18fed

  • SHA256

    af9696ddb65ef01b496f0a69e308f213b2a4effa07659f81edf6445d92c56577

  • SHA512

    91cb1b499903f4153ab9c7e00f02ff6fe6c2ea07cf8a6d9c351b34e4bd8f0de254a790f256cb0839bb34ab9f01c869f450cafe81c87ab5798b661c010c21a4c8

  • SSDEEP

    6144:M5fYH5EeQRFT7Zoi1jY0Ie++M0vLvsZ2tsR6lRStFaYcr/bK+gGfZBZoKQJrV51U:vQR17Zoi1LIeJMsvsrcl0tQRZydVnQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af9696ddb65ef01b496f0a69e308f213b2a4effa07659f81edf6445d92c56577.exe
    "C:\Users\Admin\AppData\Local\Temp\af9696ddb65ef01b496f0a69e308f213b2a4effa07659f81edf6445d92c56577.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe
      "C:\Users\Admin\AppData\Local\Temp\\wgapeuvubjtcez.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\parent.txt

    Filesize

    471KB

    MD5

    ad131cba995cc276bec99ab6a2414822

    SHA1

    d4280259a51995bde6c1efdcc35dd633b3d18fed

    SHA256

    af9696ddb65ef01b496f0a69e308f213b2a4effa07659f81edf6445d92c56577

    SHA512

    91cb1b499903f4153ab9c7e00f02ff6fe6c2ea07cf8a6d9c351b34e4bd8f0de254a790f256cb0839bb34ab9f01c869f450cafe81c87ab5798b661c010c21a4c8

  • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • \Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • \Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • memory/1968-56-0x0000000000000000-mapping.dmp

  • memory/1968-59-0x000007FEF40A0000-0x000007FEF4AC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1968-60-0x000007FEF2DC0000-0x000007FEF3E56000-memory.dmp

    Filesize

    16.6MB

  • memory/1968-62-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp

    Filesize

    8KB