Analysis

  • max time kernel
    27s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 00:07 UTC

General

  • Target

    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe

  • Size

    684KB

  • MD5

    1dbc3d977d77938e623e7cafac224a35

  • SHA1

    45ff047892c4ee28364ce26744fa8ad19a3f858c

  • SHA256

    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f

  • SHA512

    313e76075ce3bb5dddc8e04629217074a45301f4f887459e71929cd7654bdb436839ccf14bf3acf1db68b21543710f4ddb835fcf0a0b369d020e4201cc69ed33

  • SSDEEP

    12288:4/ZqsC9Pa6P8Xu+Y0+4Kk3R61B0iYWfJWCMQHxvZj3uHcwTIfM1GjT9AlZ:4sD18Xa1A3YBZffJWCNhjeFTIfMUvOlZ

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    "C:\Users\Admin\AppData\Local\Temp\ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2028

Network

  • flag-unknown
    DNS
    r1.sunusadirall.net
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    Remote address:
    8.8.8.8:53
    Request
    r1.sunusadirall.net
    IN A
    Response
  • flag-unknown
    DNS
    c1.epicbookallguard.net
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    Remote address:
    8.8.8.8:53
    Request
    c1.epicbookallguard.net
    IN A
    Response
  • flag-unknown
    DNS
    c2.epicbookallguard.net
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    Remote address:
    8.8.8.8:53
    Request
    c2.epicbookallguard.net
    IN A
    Response
  • flag-unknown
    DNS
    r2.sunusadirall.net
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    Remote address:
    8.8.8.8:53
    Request
    r2.sunusadirall.net
    IN A
    Response
No results found
  • 8.8.8.8:53
    r1.sunusadirall.net
    dns
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    65 B
    138 B
    1
    1

    DNS Request

    r1.sunusadirall.net

  • 8.8.8.8:53
    c1.epicbookallguard.net
    dns
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    69 B
    142 B
    1
    1

    DNS Request

    c1.epicbookallguard.net

  • 8.8.8.8:53
    c2.epicbookallguard.net
    dns
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    69 B
    142 B
    1
    1

    DNS Request

    c2.epicbookallguard.net

  • 8.8.8.8:53
    r2.sunusadirall.net
    dns
    ada98fd03de5b92e55a2400bbf3d5494d0415ae983e0f5abcefcf5a7e390696f.exe
    65 B
    138 B
    1
    1

    DNS Request

    r2.sunusadirall.net

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2028-54-0x00000000762F1000-0x00000000762F3000-memory.dmp

    Filesize

    8KB

  • memory/2028-55-0x0000000000670000-0x00000000007F0000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.