Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 11:39

General

  • Target

    be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101.exe

  • Size

    408KB

  • MD5

    3203d3219082454a8c6852bc5442e544

  • SHA1

    277fe2510c0879ab645d2b5669f3d04fe8aeba8a

  • SHA256

    be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101

  • SHA512

    42a19915ccb00f92e5b3a0ea6c1d6c93222fadc10997a7cddca946988a26b03e3a226873206535ba714e1902c538ab20ddaced733678954fc8265572b2010fac

  • SSDEEP

    3072:944tPbCetTJML/HZ44kQubfIxt7UFKTY1KAyoBNYk7U15:9tCetTKL/53juboFUFKMgvoBNYdL

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101.exe
    "C:\Users\Admin\AppData\Local\Temp\be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101.exe
      "C:\Users\Admin\AppData\Local\Temp\be27f5d5432a4f55ce26e0d2a58d23c15ce1b143f1ff04a62db0b71c5de4e101.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:328

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZCG935PA.txt

          Filesize

          603B

          MD5

          b42666472bf563f627ba0acbce41223e

          SHA1

          73e37e81b3cd79bc0452b632f33249b2afefcace

          SHA256

          3b21fb38397a4c0c74c2cbe605095663efff682591696b6ad52727468ba0efb9

          SHA512

          a2353d0718d72e2e98f345f2cd7666ac5fce78199c7d8324f8ae7d86ee9ca6e8c3bc4a26edca3d2fecce0284ba4fe26c0bfe2cfd109d05bc1b1fb429e4525c00

        • memory/1100-89-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-93-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-61-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-63-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-65-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-95-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-68-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

          Filesize

          8KB

        • memory/1100-69-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-70-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-73-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-75-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-77-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-79-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-81-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-83-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-85-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-87-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-56-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-59-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-91-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-97-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-99-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-101-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-103-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-105-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-107-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-109-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-111-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-113-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-115-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-117-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-119-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-121-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-134-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1100-135-0x00000000003B0000-0x00000000003FE000-memory.dmp

          Filesize

          312KB

        • memory/1100-57-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB