Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 19:10

General

  • Target

    62603f5421dfea776e47fbd86c1917d8bfb31291238b20dd57696357fa1f94fb.exe

  • Size

    898KB

  • MD5

    c0f90f4941b137d3a31b31fd86fbf082

  • SHA1

    80c705e0d3d719d643c5d017ef23dc0fff2521a0

  • SHA256

    62603f5421dfea776e47fbd86c1917d8bfb31291238b20dd57696357fa1f94fb

  • SHA512

    33d990b0dd8ef4dbd705526c4ee1a4b569a02ef50d43de7334629e9a58046ecf1cc7308556a3b8f582f4731ff0dca4b8582d890d3ee0f8155af20f18d64c1333

  • SSDEEP

    24576:tjVpP/2vhIHNK2uzifVQaX+XjkMEvuTkPOL:5Vpnoy3N9Qgv+k2L

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62603f5421dfea776e47fbd86c1917d8bfb31291238b20dd57696357fa1f94fb.exe
    "C:\Users\Admin\AppData\Local\Temp\62603f5421dfea776e47fbd86c1917d8bfb31291238b20dd57696357fa1f94fb.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:892

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/892-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

          Filesize

          8KB

        • memory/892-55-0x0000000000A60000-0x0000000000BE4000-memory.dmp

          Filesize

          1.5MB

        • memory/892-62-0x0000000000A60000-0x0000000000BE4000-memory.dmp

          Filesize

          1.5MB

        • memory/892-63-0x0000000000A60000-0x0000000000BE4000-memory.dmp

          Filesize

          1.5MB

        • memory/892-64-0x0000000000A60000-0x0000000000BE4000-memory.dmp

          Filesize

          1.5MB