Analysis
-
max time kernel
64s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 10:25
Behavioral task
behavioral1
Sample
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe
Resource
win7-20220812-en
General
-
Target
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe
-
Size
1.1MB
-
MD5
8d315585db53c248744950a51ba8c900
-
SHA1
2f722ae5c735b9fe3e11675217f92f8524a8b26c
-
SHA256
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d
-
SHA512
6301a023013cd321f6e0f6835dca68b3331ea2ead3447e920931e8eec19e389b1b8c6ebbfa3eb668c3db104742703e909b03f5f32a31791ec89fcadef1000051
-
SSDEEP
24576:btC5ka0FgPPZOecAQDd+2e6PGXf4lcQk8A1tF4+G3UHT:bU5kDoEqK7P+sT+vHT
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1348-57-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-58-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-59-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-61-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-65-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-63-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-67-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-69-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-73-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-71-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-77-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-75-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-79-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-81-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-83-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-87-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-85-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-89-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-91-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-93-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-95-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-97-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-99-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1348-100-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1348-55-0x00000000011C0000-0x00000000012E6000-memory.dmp vmprotect behavioral1/memory/1348-56-0x00000000011C0000-0x00000000012E6000-memory.dmp vmprotect behavioral1/memory/1348-101-0x00000000011C0000-0x00000000012E6000-memory.dmp vmprotect behavioral1/memory/1348-102-0x00000000011C0000-0x00000000012E6000-memory.dmp vmprotect -
Processes:
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exepid process 1348 a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exepid process 1348 a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe 1348 a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe 1348 a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe"C:\Users\Admin\AppData\Local\Temp\a23be90461942d300004f0350940ddeb9b489d94c1708f127b4780d2dd0ce77d.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1348-54-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/1348-55-0x00000000011C0000-0x00000000012E6000-memory.dmpFilesize
1.1MB
-
memory/1348-56-0x00000000011C0000-0x00000000012E6000-memory.dmpFilesize
1.1MB
-
memory/1348-57-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-58-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-59-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-61-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-65-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-63-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-67-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-69-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-73-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-71-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-77-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-75-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-79-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-81-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-83-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-87-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-85-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-89-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-91-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-93-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-95-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-97-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-99-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-100-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1348-101-0x00000000011C0000-0x00000000012E6000-memory.dmpFilesize
1.1MB
-
memory/1348-102-0x00000000011C0000-0x00000000012E6000-memory.dmpFilesize
1.1MB