Analysis

  • max time kernel
    186s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 22:04

General

  • Target

    6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe

  • Size

    596KB

  • MD5

    f826cf64235afd722bdc1923e3643ca5

  • SHA1

    484d6cd396ae751bfefb394a1504268f881cde1e

  • SHA256

    6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037

  • SHA512

    3eed08fc9d392897d0542217e4b5a2aed6d8559614dd950c01c617eb53f420622708597469619fda47acfde2fb86be2e9c40126394a048d07a2d4b50d443087e

  • SSDEEP

    12288:stlYXUUf0ENyltI6oFQit0zM4fTirtRmx6auqUZBjlmWLXgaKx:szYXUU8my7AFfQfTiuu1BjlfUx

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe
    "C:\Users\Admin\AppData\Local\Temp\6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1772
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

    Filesize

    1KB

    MD5

    bc35c37cd5181460ed1207541ee270ee

    SHA1

    7e64fe1a9d9d5ec82b7da2b7df42428c01d3780e

    SHA256

    0355e05e2a39033a33f252abbff3aa48fcfd0eef17613c7b2151da3dafcdc4a2

    SHA512

    a419118ce660fe957c3e8544ff88efa2f955860a3bffc504d2cc731fec336d13140ac1f18f0002d26e23a6600cbc311c8975dd33869dcc78c91995960e36b486

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7D3ONJ6Q.txt

    Filesize

    608B

    MD5

    45d94dfb6777d4194aca7cf2423b27bc

    SHA1

    639702c31614713cafdd2f4a633f4d2432dfe303

    SHA256

    421ddd6460d11a588bfd78e32d6b5a912c1372c6a1750eda6c6e2b3b4ebd18fd

    SHA512

    eadb2edc18e206e17c81197462ae9826ee50601c39bbd2d77e77be12d9fd59ce03405cbe6d8942fd5f9aeb0ab16bf3499fd52389403fd9558969372031c03a67

  • memory/1772-54-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB