Analysis

  • max time kernel
    149s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 14:40

General

  • Target

    aa5afc7a11983a547176e526c6e1bf304e1933684a4efd57803451241e862081.exe

  • Size

    638KB

  • MD5

    08458c7838a78efa0ac089627b10f6c0

  • SHA1

    6516c18bb8bf76f290332cbf584cd3022ce79ccc

  • SHA256

    aa5afc7a11983a547176e526c6e1bf304e1933684a4efd57803451241e862081

  • SHA512

    f13d49b98e28cd91bfe6d5403c2573fd72e79ae8289ff2da5a2f0e88213c856d8e476ba6111c3e0e0159e9504e3a2504bcd94ccf8489c4a208daecb843569499

  • SSDEEP

    12288:j2I9Oy2fYOEKg9VicRiYu3REOU+aZbPWS6kuUNP3S06e8X:C42+KgHiaiYMEOUVZTrjNPi7

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa5afc7a11983a547176e526c6e1bf304e1933684a4efd57803451241e862081.exe
    "C:\Users\Admin\AppData\Local\Temp\aa5afc7a11983a547176e526c6e1bf304e1933684a4efd57803451241e862081.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index3.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1112
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index3.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:896 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    79f835c6861f93e3c63f7113a4a017bb

    SHA1

    664ae20ab5e4e31956d2089f6030b52d79061b5d

    SHA256

    238a792db7eb753ef146e9f4b2e073f614a0c4d1752ead63456570cafca7aaa6

    SHA512

    88bbc5e3b85f96e8e67a8e978b0b93057ac4e3ca6237c7187020afd0024ac993bfaa5338e8d9c5401b073bc654a8eed5fcfaf6b967dd861db13a12fa475237ee

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{436C3D51-710D-11ED-8BE9-EEAC7132E42C}.dat

    Filesize

    5KB

    MD5

    bfe842d64ed9d7d3f507ef35f051aaeb

    SHA1

    95bd5e06e07138287bb641e1f6beaec161ca227f

    SHA256

    51df9b019b79f8b39be4f184f0ebf93c06dccfa090efd49c3ec022c7aeb0a9f3

    SHA512

    05d24e992f9771a47384e4269c6c2a5402be2e4f9f3e402250741e1dc5e41a02d6ff2ee2900b60fd8d9e60712e211131e6e8565d36db2939d81a75184d5ba149

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1HMZIG41.txt

    Filesize

    533B

    MD5

    00eb14400fdce455932a175f8305a3db

    SHA1

    859078d888c66281b6f5c01dfd5a9db84c622b17

    SHA256

    5e78c8b9ef807ec9fa22a8e74344892d93a53a6c7f12b09321e39fcf38aa5c08

    SHA512

    8a3cf76ee96f233e9ec85843a1307fecba65c13529b0375a16356a2029c5dd9637ba1daa1a79f63af0e4c64bb099f2e935e9e0d2d3a0bf4fb0ade5413cb5b2fa

  • memory/1352-56-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1352-57-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB