Analysis

  • max time kernel
    95s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 18:50

General

  • Target

    d2ed92241609057798353b8fd14046a9de0800bb3adbc114aad44b8d250372fa.exe

  • Size

    923KB

  • MD5

    a48630abeb1e73135c83c45d6ada1a91

  • SHA1

    d29514816cd325e6b90d394c984088ed425f3fc2

  • SHA256

    d2ed92241609057798353b8fd14046a9de0800bb3adbc114aad44b8d250372fa

  • SHA512

    edeff3aaf0d751dccc4de8c4a587035e9deae3a16296cca6990c4ef15bfdbb6bc74b74959d80015bc0aa27d01dbbe5c4d715e75cab5910e05030b29ea27eeff8

  • SSDEEP

    24576:o9tx/u0OEWR0L7D3hpRuBPzrQHB8l6q9S+b6Efy+:Q/TO4L7DRpUPzrQh8Zz2Ea+

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2ed92241609057798353b8fd14046a9de0800bb3adbc114aad44b8d250372fa.exe
    "C:\Users\Admin\AppData\Local\Temp\d2ed92241609057798353b8fd14046a9de0800bb3adbc114aad44b8d250372fa.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1276-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/1276-55-0x00000000020E0000-0x0000000002265000-memory.dmp

    Filesize

    1.5MB

  • memory/1276-63-0x00000000020E0000-0x0000000002265000-memory.dmp

    Filesize

    1.5MB

  • memory/1276-62-0x00000000020E0000-0x0000000002265000-memory.dmp

    Filesize

    1.5MB

  • memory/1276-64-0x00000000020E0000-0x0000000002265000-memory.dmp

    Filesize

    1.5MB