Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 09:02

General

  • Target

    e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa.exe

  • Size

    130KB

  • MD5

    5bb16aa83e702f599f521c89bbfc6706

  • SHA1

    2a1527ccd4d4a667fcebd1a948bd6a31d4fb4629

  • SHA256

    e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa

  • SHA512

    584dd5bc163b54661a2141b2db3312c1476b7f15babe3478abd7e18e269dc83dce7df19f4c515e91d12c0d42596579eb11f54ac40df98535158d6e5ef479eceb

  • SSDEEP

    3072:3dK5fyVxt6jznO7P/3Qimke50bTc26K49h28uS:3s1OP/3Qimk/fcNvh28f

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Kills process with taskkill 3 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa.exe
    "C:\Users\Admin\AppData\Local\Temp\e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa.exe"
    1⤵
    • Drops startup file
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im iResearchiClick.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:820
    • C:\Users\Admin\AppData\Local\Temp\e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa.exe
      C:\Users\Admin\AppData\Local\Temp\e42f6dd08dffb9cc32ec8392b614592a5e056bb7a9e81f4dfe5758b12dcbf7aa.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1280
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im internat.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im internat.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1640
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\1.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1.reg

    Filesize

    171B

    MD5

    0f9a0031e7606235e4ae9f59a6752aaf

    SHA1

    ac60b058c2f18e010f651f6ea8a5fb0833c960d6

    SHA256

    c77e2c06d760fae7e60cd522941fef6dd57d382981b65d6ad5c67cefd093aa78

    SHA512

    4ddebf9b637dd5a17b6544121ea7b4e987638b2f5dcedd3ce2859c1385d190fe9c6944d78063419f48f9fbe3580307df5f67ac23dbc77270852a5ea2e40429a9

  • memory/2012-56-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB