Analysis

  • max time kernel
    147s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 04:45

General

  • Target

    9930639a034faf01e7d95206e2a84e823cebc77f5ecf7aff7f1afeb0330b8216.exe

  • Size

    286KB

  • MD5

    11a4647725be7c5c8e72941b089a0200

  • SHA1

    2d905b29dd77cd9a4dc5da87be25055cca727c3b

  • SHA256

    9930639a034faf01e7d95206e2a84e823cebc77f5ecf7aff7f1afeb0330b8216

  • SHA512

    14c8850a592288b86f6a0fac02774357767e894dfd6f32e64e7ba15d819caba4c208c44247717806f6a71eeac36caec6b4eac3e16291fdcf1f91ada7c346edce

  • SSDEEP

    6144:BNZPt/dET4gJLfbf7AjLhjObfosu8jJIJrheAdefWjz:BNZZyEuTbf0jgTon8mfdefWjz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9930639a034faf01e7d95206e2a84e823cebc77f5ecf7aff7f1afeb0330b8216.exe
    "C:\Users\Admin\AppData\Local\Temp\9930639a034faf01e7d95206e2a84e823cebc77f5ecf7aff7f1afeb0330b8216.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Deletes itself
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1736
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:760

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W33WO4JA.txt

          Filesize

          601B

          MD5

          fee89ba6fa662ecbb3bee448e5e3240e

          SHA1

          c3c350b312e678f5c8ded4541f2a44bc3b3784d7

          SHA256

          258ac97355605cf7758ba856b9a0c86c3ad892fedd465039e6bda7d133cced11

          SHA512

          2ebc65826f935e8990852b2ce914b0a9234e2cd1af113fa24ce5a00b0df30d0826966d5a30cdf370aa3672baa5e94b9cd186f3be816a5f6809f7319dbb3ea601

        • memory/956-84-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-92-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-57-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/956-58-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/956-59-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-61-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-63-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-65-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-67-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-88-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-69-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-73-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-75-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-77-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-82-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-80-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-86-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-54-0x0000000075891000-0x0000000075893000-memory.dmp

          Filesize

          8KB

        • memory/956-56-0x0000000000220000-0x0000000000234000-memory.dmp

          Filesize

          80KB

        • memory/956-90-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-71-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-94-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-100-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-98-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-96-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-102-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-106-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-104-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-110-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-108-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-114-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-116-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-112-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-120-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-118-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-122-0x00000000002B0000-0x00000000002FE000-memory.dmp

          Filesize

          312KB

        • memory/956-123-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB

        • memory/956-55-0x0000000000400000-0x0000000000469000-memory.dmp

          Filesize

          420KB