Analysis

  • max time kernel
    49s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 10:51

General

  • Target

    61801d06f96bea5e5637e5a2cf01940e6f6101361b79130fe27ca6e966d30b98.exe

  • Size

    821KB

  • MD5

    f2ed62085851ba86abb971a2480c2840

  • SHA1

    ff1e2e6e92ee89baaa485cf262b28b1c174a496d

  • SHA256

    61801d06f96bea5e5637e5a2cf01940e6f6101361b79130fe27ca6e966d30b98

  • SHA512

    56a83bebfa42bea26e023edd1ed45d3449cd0e1109dd234c2d3a3163ee0ec18d7fec1262e2702a74beb9a7b56405549ed71eff283e3d9b58df61ed61c2dae50f

  • SSDEEP

    24576:fiJKOKyTBAzfDOsprOLlUB7bhLPuTsF5zOTTNGm:fiJKgTBAzhQaIcm

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61801d06f96bea5e5637e5a2cf01940e6f6101361b79130fe27ca6e966d30b98.exe
    "C:\Users\Admin\AppData\Local\Temp\61801d06f96bea5e5637e5a2cf01940e6f6101361b79130fe27ca6e966d30b98.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB

  • memory/1504-55-0x0000000000A00000-0x0000000000B80000-memory.dmp

    Filesize

    1.5MB

  • memory/1504-63-0x0000000000A00000-0x0000000000B80000-memory.dmp

    Filesize

    1.5MB

  • memory/1504-62-0x0000000000A00000-0x0000000000B80000-memory.dmp

    Filesize

    1.5MB

  • memory/1504-64-0x0000000000A00000-0x0000000000B80000-memory.dmp

    Filesize

    1.5MB