Analysis
-
max time kernel
42s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 03:47
Behavioral task
behavioral1
Sample
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe
Resource
win7-20221111-en
General
-
Target
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe
-
Size
4.3MB
-
MD5
d7e71e867ec10ae2e7c6998ab59dc2f6
-
SHA1
53ed40bb480eff2f003ec01b4852cb8beb70b569
-
SHA256
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06
-
SHA512
47ff798782e758bad126aa1c757e31e8706d9adfe756bb261addb0dad1e828a17db319aaf11e619659802a6ac0ea6e914a7eb4032480f666af69b3cd0be980fb
-
SSDEEP
98304:1XPTAMPmUq0V0Rv5sq+AoWxHnjYL0OjyhZLIvRuvRiy:1fD+/w0Rhs4zYQOuzIvRuvRf
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2044-60-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-61-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-62-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-67-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-71-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-75-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-79-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-83-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-89-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-91-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-95-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-101-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-99-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-103-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-97-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-93-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-87-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-85-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-81-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-77-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-73-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-69-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-65-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-63-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2044-105-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/2044-55-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect behavioral1/memory/2044-56-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect behavioral1/memory/2044-104-0x0000000000400000-0x0000000000E57000-memory.dmp vmprotect -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.2345.com/?k1902203" 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k1835228435" 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exepid process 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exepid process 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe 2044 1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe"C:\Users\Admin\AppData\Local\Temp\1ca766cf11ebf742845e34d433b93bdd82b2e6c14ae2cf4ce43a4db3ff284c06.exe"1⤵
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2044-54-0x0000000076651000-0x0000000076653000-memory.dmpFilesize
8KB
-
memory/2044-55-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/2044-56-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/2044-58-0x0000000000F8A000-0x0000000000F8C000-memory.dmpFilesize
8KB
-
memory/2044-60-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-61-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-62-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-67-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-71-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-75-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-79-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-83-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-89-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-91-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-95-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-101-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-99-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-103-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-97-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-93-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-87-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-85-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-81-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-77-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-73-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-69-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-65-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-63-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-104-0x0000000000400000-0x0000000000E57000-memory.dmpFilesize
10.3MB
-
memory/2044-105-0x0000000010000000-0x000000001003D000-memory.dmpFilesize
244KB
-
memory/2044-114-0x0000000003F71000-0x0000000003F74000-memory.dmpFilesize
12KB
-
memory/2044-118-0x0000000003ED0000-0x0000000003FD0000-memory.dmpFilesize
1024KB
-
memory/2044-120-0x0000000003ED0000-0x0000000003FD0000-memory.dmpFilesize
1024KB
-
memory/2044-124-0x0000000003EE5000-0x0000000003EE8000-memory.dmpFilesize
12KB