Analysis

  • max time kernel
    136s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 12:37

General

  • Target

    deb818a627dc9fb39e3f5652e379fad89d09fee88233e70a086f3366b8796d9e.exe

  • Size

    600KB

  • MD5

    81a4839a22c9ce63b29a3494d5e8e271

  • SHA1

    8220025fbf0a5cc0a1960101c907955629db2a6f

  • SHA256

    deb818a627dc9fb39e3f5652e379fad89d09fee88233e70a086f3366b8796d9e

  • SHA512

    1df71f34d6d6172e07921a1d12238fd43a8420179dcae7fb94d9343add8c2ed71888f15fe05e8f52d563a0abad6cd78353d2ec862c25b5ae201a100cd22635b5

  • SSDEEP

    6144:/yvNdOw29lBUcyp7aXs73hq+uJp1UwyoYemQcA0FHnJ7DZ7Ahg0BFhOBAavE:/yOw29h2mXs73cVUv9/HnxDZ7x05Oo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deb818a627dc9fb39e3f5652e379fad89d09fee88233e70a086f3366b8796d9e.exe
    "C:\Users\Admin\AppData\Local\Temp\deb818a627dc9fb39e3f5652e379fad89d09fee88233e70a086f3366b8796d9e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dz239.com/gen/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:892 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:552

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1KS4REUU.txt
    Filesize

    89B

    MD5

    81018b51f08e89064ab254e45367d266

    SHA1

    c440798d44eaa65ceb83c9810ab5ddaf7de0dd4e

    SHA256

    e3d7b4c5cca4bc3e27b7b1338a68d6b2f5adb9633cf6481451915858fb1cc10b

    SHA512

    6567cf1218baa9e38ca4a14ae728b62f1d2c1f10e05d3bc4d3a6422d20b98e9121f4378a104c12274b485ad29c21a8be9238f343f10036d3cd5ce4a8bc4f5775

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LQZTZZC2.txt
    Filesize

    608B

    MD5

    b253f7159c600262ff00b888956fd3d7

    SHA1

    c54409cd78e449cd8629820b448b7e189252beb6

    SHA256

    1ec5d48b8ce06aefda2d99dcbc40e8ee2d040992d56ac3ff2d8c56360f1735aa

    SHA512

    bc36cb2423d27ac21313c2146b817497b12e0f58e7cdb219c76b69a59976a887cc9531bf56588daed40b8844cb551f64b8f0061c48553a9c385b8c1bd187b776

  • memory/1160-54-0x00000000757E1000-0x00000000757E3000-memory.dmp
    Filesize

    8KB