Analysis

  • max time kernel
    107s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 22:10

General

  • Target

    04bbcf6890157efdd46ea12f3a868c96cee426859b23826b92bd0afeb730b2a3.exe

  • Size

    28KB

  • MD5

    4b2d2e98ea5aa01cb2ff5c4db0d9037e

  • SHA1

    a81a5be9e1eb6cddb3d310a030f1210039f6a2e1

  • SHA256

    04bbcf6890157efdd46ea12f3a868c96cee426859b23826b92bd0afeb730b2a3

  • SHA512

    c3ed72da3f880eca02f593b2f84ca6ead73d5b4f4a688d232274e1ff60d65a369b472fc0abe728cbc1967174fc51902751a6bd951972e43fa3c3cfe9d3805b08

  • SSDEEP

    192:rIwjyA1Y8q+7qbltEcPQd+6vJnBAtoKCrEBKvJyVHMwkrxwc3tWy:rIsx1YVrBtEcoEk9BD5RKHh8xwcQy

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04bbcf6890157efdd46ea12f3a868c96cee426859b23826b92bd0afeb730b2a3.exe
    "C:\Users\Admin\AppData\Local\Temp\04bbcf6890157efdd46ea12f3a868c96cee426859b23826b92bd0afeb730b2a3.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\REG.exe
      REG QUERY "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /reg:64
      2⤵
        PID:1168
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe http://www.jisubianxian.com
        2⤵
          PID:2004
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.jisubianxian.com/
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:456

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        888bb3741adc75396b3989f09f8f59a9

        SHA1

        d7f32e0e2d48e1af23df2f2a7f5fab75aeeed07f

        SHA256

        e5e6301d8b8249a9519daf2d34698c24224066a35f2bd8e524b2bdee163df413

        SHA512

        169df1519c54e3c1af85ff1380ae04a6d18b2d46efcc12fba0e28ef2f0ac0820644357630c42d8e1975d67ad2096db3310202c70c8b3dfaf5e7a80bbe2ff46e8

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
        Filesize

        8KB

        MD5

        2058294ddd9c83ee5e0d18416d190263

        SHA1

        93fadfdc6b37729f8a67269f099dc7ebdd05e4c4

        SHA256

        1c11b320d16de15c9db9d868bc749b83df5dbe5a2242ca6757da46a7a2dfb05e

        SHA512

        e6f757afdd945302d599e1c7cdcbd71322739286b88404a25858ac3a2637e10fb0fb08d8a6765c5d45f4e48f9e4394a795406464187a1c29581af45662adb140

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UQ130JMA.txt
        Filesize

        608B

        MD5

        80a9c118e5128a1e3175b83f98af9d90

        SHA1

        ef2f7c46173b5567d167d353765590a8282c0152

        SHA256

        98dacef4375a18b139a4b9cdcc6d194067a87525de206c331c8739dffe8d4931

        SHA512

        32d6d732a67b204c5cc6936bfc1a18aece1c5eff089378b2ad05d470b7c69896524598017024636bdf1ab50c824c6571f3af133ebb263eb1996a9cef4aeed31b

      • memory/1168-57-0x0000000000000000-mapping.dmp
      • memory/2004-59-0x0000000000000000-mapping.dmp
      • memory/2004-60-0x000007FEFC2F1000-0x000007FEFC2F3000-memory.dmp
        Filesize

        8KB

      • memory/2016-54-0x0000000075A71000-0x0000000075A73000-memory.dmp
        Filesize

        8KB