Analysis

  • max time kernel
    229s
  • max time network
    305s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 14:29

General

  • Target

    a39414bf9df35afce4a08754f6820f0c4938076bab2ef2a3688fdd2ae56457f2.exe

  • Size

    278KB

  • MD5

    b6cdef2ed063139933609d4079c7d8ef

  • SHA1

    a749c311230197bbe5813da722c7105ca7473c3e

  • SHA256

    a39414bf9df35afce4a08754f6820f0c4938076bab2ef2a3688fdd2ae56457f2

  • SHA512

    7ca1220c991ddf80fc85d8daccd97e59dc12c335c8eca29c666d116fa239b7bf3ca1b108d5c0e1892779ba21962958170e6ae122532cefae7fc04a6244fcd78b

  • SSDEEP

    6144:P96TYZlBA6aE5LG3UNMrStlfdtnM35EQjELsmOVQmX/nvs4:VnBA6anU+rSPo3jvX/7

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 38 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a39414bf9df35afce4a08754f6820f0c4938076bab2ef2a3688fdd2ae56457f2.exe
    "C:\Users\Admin\AppData\Local\Temp\a39414bf9df35afce4a08754f6820f0c4938076bab2ef2a3688fdd2ae56457f2.exe"
    1⤵
    • Drops file in System32 directory
    PID:1168
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:992
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:537613 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1580
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:668681 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:537647 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:865316 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1720
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:1127450 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PJ3PNHZO.txt

    Filesize

    601B

    MD5

    d7ac20f6cbbae496a60d2cf527c50183

    SHA1

    dcf06f91b0d3d604b160f230ac6a2e7d2af6c7bf

    SHA256

    51e617e5f65e28ed1e483fb169114dcb3076bf96787f2495b338839598ee2195

    SHA512

    9d748298aa8d4a62360f5c8483b725fb741b1e9f91d63e0613a9c429953ecb8d0a98996ea7f0561b72ee210bd1903602a1555b4acf017bbe6547981251fc953d

  • memory/1168-54-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/1168-55-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/1168-56-0x0000000075441000-0x0000000075443000-memory.dmp

    Filesize

    8KB

  • memory/1168-58-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB