Analysis

  • max time kernel
    151s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 04:39

General

  • Target

    14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe

  • Size

    18KB

  • MD5

    78b8acb158adb4796becc24018ccd57c

  • SHA1

    07e57bf5211ff0331a87768928c0f366da23aec8

  • SHA256

    14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1

  • SHA512

    e65381f1cfef4934e16e3a7c1c813771c18f94aa1af6f5494d0f943bc79b0bb9efbc08f77c2054650397f616e12a70e31d8caaa809ad7fb7834584ae4ab2c2f6

  • SSDEEP

    384:pMx/fm5ytArqyA5qELndnAKhkeEdEtUQ8zzhqVZ:uxHm5kA89tAyiEtUQ8zzhOZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
    "C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe
      "C:\Users\Admin\AppData\Local\Temp\14e1652773367a77c4ff8d97cffc7bdefcde45ba7eeed1f4b2156de233d4baf1.exe"
      2⤵
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/872-54-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-55-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-57-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-58-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-59-0x0000000000402040-mapping.dmp
  • memory/872-61-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-62-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB

  • memory/872-63-0x0000000075F81000-0x0000000075F83000-memory.dmp
    Filesize

    8KB

  • memory/872-72-0x0000000000400000-0x0000000000404000-memory.dmp
    Filesize

    16KB