Analysis

  • max time kernel
    188s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 22:04

General

  • Target

    6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe

  • Size

    596KB

  • MD5

    f826cf64235afd722bdc1923e3643ca5

  • SHA1

    484d6cd396ae751bfefb394a1504268f881cde1e

  • SHA256

    6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037

  • SHA512

    3eed08fc9d392897d0542217e4b5a2aed6d8559614dd950c01c617eb53f420622708597469619fda47acfde2fb86be2e9c40126394a048d07a2d4b50d443087e

  • SSDEEP

    12288:stlYXUUf0ENyltI6oFQit0zM4fTirtRmx6auqUZBjlmWLXgaKx:szYXUU8my7AFfQfTiuu1BjlfUx

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe
    "C:\Users\Admin\AppData\Local\Temp\6af66ebc341a8e2e62f668252627dc1b6b3931baedbab3b3d32c98cf843ae037.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:2200
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:1232
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4264 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3496

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\xyoggsx\imagestore.dat

      Filesize

      1KB

      MD5

      11656e06df39ce8a393c1548b1839541

      SHA1

      7ec647c0006399968e805077e3d53de6b9fc9ece

      SHA256

      1f6f397a8207d0b2a4a58c41c60c377b5fb2f200580b3900561089c687d7e6b9

      SHA512

      76b0519ba736153817092014e79780dbbe7f0c9d3a928771eb82b2f8fc908aa2a297edac54d8ced4370deafb6380e99721a8665680774799283fce3eb900abd9