Analysis

  • max time kernel
    116s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 03:46

General

  • Target

    f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6.exe

  • Size

    172KB

  • MD5

    4ac89b73c3f84b1b411039e69b3db190

  • SHA1

    46c4efbcc138840eaed8f5c26f5bb74ef5e79ce9

  • SHA256

    f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6

  • SHA512

    3ada6a66b49509a9907b1f6b07c100b8506d983212a9448a5edfdcd052b03f51831f61dcce855675b525f3b4f6a63bc847343a172c90b60e1953614ed37b5cd9

  • SSDEEP

    3072:u3Qdvtycor+KTslwnm8QjxgvReWh0zzzd0pe1RdJzzzzrkzz6Pzf6lzz11MzU+JF:zvQcfoDZD/JJqc4xJ5nct

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6.exe
    "C:\Users\Admin\AppData\Local\Temp\f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6.exe
      C:\Users\Admin\AppData\Local\Temp\f7eaccc3f4b306591958f77a03564e042071a9d97f58fee8af3f646e097c43a6.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R1V0F3YD.txt

    Filesize

    608B

    MD5

    8cbbfd7a7f784fed7a9e9a813cbea731

    SHA1

    37a44e8158ca845bcc2b1b67ab3d53bf8ac36645

    SHA256

    fbc5cfe82e938d37825238ff442a27b3790e10e0eaff77a1f8f54b6fb1208ea8

    SHA512

    c22c1aca6b584c925a7da679013c5208448a20a46e2bdd2c9e5889e3deeb30f857bf10bb40f4af6d207b386cf9389993600064a237cc2ba08aabf416435e406d

  • memory/1740-92-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-121-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-60-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB

  • memory/1740-61-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1740-57-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1740-63-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1740-90-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-68-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-70-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-72-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-74-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-76-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-78-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-80-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-82-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-84-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-86-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-94-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-66-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-88-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-96-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-98-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-100-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-102-0x0000000000560000-0x0000000000624000-memory.dmp

    Filesize

    784KB

  • memory/1740-103-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-105-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-107-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-109-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-111-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-113-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-115-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-117-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-119-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-129-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-123-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-125-0x0000000000560000-0x00000000005AE000-memory.dmp

    Filesize

    312KB

  • memory/1740-128-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1904-55-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1904-62-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB