Analysis

  • max time kernel
    136s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 06:08

General

  • Target

    8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe

  • Size

    168KB

  • MD5

    614dfc5635f3515b6b8c63b2928f98e0

  • SHA1

    fabc50160503331844442f655fd3b73d18cc098d

  • SHA256

    8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0

  • SHA512

    2ed82946b950899c59d3e07f089069c57e1f37e5673aa80f949e3d570231c51926908b59c15acf6e49f07d9b0d1f4d29c8887623a6b6939459e2dc80b8907ae0

  • SSDEEP

    1536:HW26WFbKrDU9DTWYvOfw/5+9LbIcvxLg3c3XlSPolNgZfAXgVH/QtM0BWr0pkd:PTW6LcLbIVclSrfAwfQtMJr0pkd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
    "C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe
      C:\Users\Admin\AppData\Local\Temp\8886b04c87ca012bf6042b388f21f00b523395ef171dcd2b24d986b449eccee0.exe -rc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\program files (x86)\Internet Explorer\iexplore.exe
        "C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:280

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          340B

          MD5

          e54585295a5864a2a73a862504cc5cdd

          SHA1

          08b09a89a92407dbacc0e00f9a08518dec842dec

          SHA256

          bd4adb903c574abed8dae3e2a8dd2b0d0081abd3365ea281aabaf4fd921fc2e4

          SHA512

          978ed4cb1f761b2402cb44ee167e9e4dd7a87c40c160c1d7cb39ef94f46da2e42fc5250f9bf68956fe878a84cb4b5afb7bc2d98bd4e56a102caf3b26b09539e9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          5KB

          MD5

          479c1388799d4bda2cbce5ff8730fcd0

          SHA1

          ba3659e0f1a9ce7650612ca59da7c8fa872b95d5

          SHA256

          ce131f69ff945c2c7a63d40d17409db72c8b87411a6c083c35a8a8867a0d8892

          SHA512

          24c9d27e1485ebbbfd52973caa2ebfb015071ec8b0212ab3e3aa0dda060a7c0ad09b58257a0afb9fb433fbbe44c7cc787331129a29c7c9e4b1d55fa03b21fc31

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QTTPCYUU.txt

          Filesize

          608B

          MD5

          33ddae970f5d5b98af1013a865bd6fc3

          SHA1

          0d47cd599ab81fbc21dca21735973a3ea81c328c

          SHA256

          0234e1fc8d4f4129b856701629fcf678ff7c952f786a8f1e702974b8715ed686

          SHA512

          003478ae44bc9f1bd3a699e1114bb26ee8c6f63cae61443cb76c9d9729fd5be9c25e21eba075e8b7af66c7a78e4704322ed8f8480f69dc3639843e27f65d0431