Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 12:43
Behavioral task
behavioral1
Sample
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe
Resource
win7-20220812-en
General
-
Target
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe
-
Size
1.1MB
-
MD5
13f0572b77adbb54cad0b9f6108b3096
-
SHA1
7df49cf686b3e993d390015729240231b9270a70
-
SHA256
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455
-
SHA512
1745bf36555122ce7bb0db39347fd28f982f0f7a9dd961d45ee14cbafa7c27c335235d53a94a751020f0c59ff8f3e41dde913efe4c068ab35eea9cd6e8b22578
-
SSDEEP
24576:jtCIka0KgZPUOecAQDd+2e6PGXf4lcQk8A1tF4+GW8ESUZG:jUIkDDvqK7P+sT+LQ6G
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1992-57-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-58-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-59-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-61-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-63-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-65-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-67-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-69-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-71-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-73-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-75-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-77-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-81-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-83-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-85-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-87-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-89-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-93-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-95-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-99-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-97-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-91-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-79-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/1992-100-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1992-55-0x0000000000EE0000-0x0000000001007000-memory.dmp vmprotect behavioral1/memory/1992-56-0x0000000000EE0000-0x0000000001007000-memory.dmp vmprotect behavioral1/memory/1992-105-0x0000000000EE0000-0x0000000001007000-memory.dmp vmprotect behavioral1/memory/1992-106-0x0000000000EE0000-0x0000000001007000-memory.dmp vmprotect -
Processes:
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exepid process 1992 dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exepid process 1992 dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe 1992 dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe 1992 dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe"C:\Users\Admin\AppData\Local\Temp\dbd0637bec704fe89e5d540c9f2710a9e8f052d2c566e1b8fcbd0945920cd455.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1992-54-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1992-55-0x0000000000EE0000-0x0000000001007000-memory.dmpFilesize
1.2MB
-
memory/1992-56-0x0000000000EE0000-0x0000000001007000-memory.dmpFilesize
1.2MB
-
memory/1992-57-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-58-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-59-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-61-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-63-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-65-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-67-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-69-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-71-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-73-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-75-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-77-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-81-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-83-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-85-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-87-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-89-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-93-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-95-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-99-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-97-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-91-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-79-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-100-0x0000000010000000-0x000000001003C000-memory.dmpFilesize
240KB
-
memory/1992-101-0x0000000005D30000-0x0000000005ECD000-memory.dmpFilesize
1.6MB
-
memory/1992-105-0x0000000000EE0000-0x0000000001007000-memory.dmpFilesize
1.2MB
-
memory/1992-106-0x0000000000EE0000-0x0000000001007000-memory.dmpFilesize
1.2MB