Analysis

  • max time kernel
    109s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 00:05

General

  • Target

    75cacf05bc521df56fab4fc60fcb4acedf5b8245b817d180f9fe8251b4e746de.exe

  • Size

    1.0MB

  • MD5

    48374eaeed5a8135eb2a9c51888123af

  • SHA1

    477877d867bae864e8dcc241a19b4f756279670a

  • SHA256

    75cacf05bc521df56fab4fc60fcb4acedf5b8245b817d180f9fe8251b4e746de

  • SHA512

    ef5d1b7723b8fd122f5f67f07e4688a3c13fca3c031f5e1ccb152035374d211a6d763a3796c8c6a63a78b6167b5498511606801a00a46100122a7f04cc7ae50a

  • SSDEEP

    24576:Qc936BzWF4GH0W4Xj3rK84mgLaLFpxG6/DgaHihsO:n68F4GH+z94xLaLFS6/sYO

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75cacf05bc521df56fab4fc60fcb4acedf5b8245b817d180f9fe8251b4e746de.exe
    "C:\Users\Admin\AppData\Local\Temp\75cacf05bc521df56fab4fc60fcb4acedf5b8245b817d180f9fe8251b4e746de.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
        PID:1920
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2044
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:4207618 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1476

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\E344V4T7.txt

      Filesize

      603B

      MD5

      980fac92aebf53dc4cb90c178f205694

      SHA1

      73832bda62c917225e3f52be60b6439c5f22f739

      SHA256

      dc162f93385c2bc9ebc0b27ba0c0d8bd77750c732c70c43598294d83a1d174f1

      SHA512

      57633a0de9ee5a7ae909d30749ea10d8aabd8e8f2fa5f8b01f9804b1296f978acc12f7d6295067a3d49b842a3dc5e77e3dc3a8a9e672457a144802029bbbefb3

    • memory/1136-72-0x00000000004329EE-mapping.dmp

    • memory/1920-55-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-56-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-58-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-59-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-61-0x00000000004329EE-mapping.dmp

    • memory/1920-60-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-63-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1920-65-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1932-54-0x0000000076181000-0x0000000076183000-memory.dmp

      Filesize

      8KB