Analysis

  • max time kernel
    186s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 20:46

General

  • Target

    d26be7c23ef3fa9a41957d0140437fb25c7751e26918ecb1eb3335bce11615bd.exe

  • Size

    471KB

  • MD5

    f315548ce1efc5087cdcdcdd2e4945fc

  • SHA1

    cbd1efeacbfef66f61534b137c8251cb079229f3

  • SHA256

    d26be7c23ef3fa9a41957d0140437fb25c7751e26918ecb1eb3335bce11615bd

  • SHA512

    27e2f25e30b93b87fcee9bb31c702168c12778d80bf5719a238a5673ecc8dbe4b371450d0be103c4c6226d2953f4b75408535d3bc28028e88ef528507a8f5ee2

  • SSDEEP

    6144:E5fYH5EeQRFT7Zoi1jY0Ie++M0vLvsZ2tsR6lRStFaYcr/bK+gGfZBZoKQJrV51u:nQR17Zoi1LIeJMsvsrcl0tQRZydVnq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d26be7c23ef3fa9a41957d0140437fb25c7751e26918ecb1eb3335bce11615bd.exe
    "C:\Users\Admin\AppData\Local\Temp\d26be7c23ef3fa9a41957d0140437fb25c7751e26918ecb1eb3335bce11615bd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe
      "C:\Users\Admin\AppData\Local\Temp\\wgapeuvubjtcez.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\parent.txt

    Filesize

    471KB

    MD5

    f315548ce1efc5087cdcdcdd2e4945fc

    SHA1

    cbd1efeacbfef66f61534b137c8251cb079229f3

    SHA256

    d26be7c23ef3fa9a41957d0140437fb25c7751e26918ecb1eb3335bce11615bd

    SHA512

    27e2f25e30b93b87fcee9bb31c702168c12778d80bf5719a238a5673ecc8dbe4b371450d0be103c4c6226d2953f4b75408535d3bc28028e88ef528507a8f5ee2

  • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • C:\Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • \Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • \Users\Admin\AppData\Local\Temp\wgapeuvubjtcez.exe

    Filesize

    19KB

    MD5

    41b6199415075e5e59f766b80f0de9d0

    SHA1

    8dee026bd21eb2835a31707300879e3d5c3fdaef

    SHA256

    9d97f6539209d1482e8510bc40a8bff668e7863adee6ebf51a46e6e912d585b5

    SHA512

    3f5c38cb855d7319b737f1cafb0b9b51fa93b12a91b8c35cd04e4a816dc2c5e8dc26dc50d0c653ddb037a75e6a560b2cbf618c74e013bf4ea6e90188bf3d4af2

  • memory/1800-59-0x000007FEF3A20000-0x000007FEF4443000-memory.dmp

    Filesize

    10.1MB

  • memory/1800-60-0x000007FEF2980000-0x000007FEF3A16000-memory.dmp

    Filesize

    16.6MB

  • memory/1800-62-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmp

    Filesize

    8KB