Analysis

  • max time kernel
    134s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 23:04

General

  • Target

    b2e9676872a44efc96894c89af1f725f645bbfcfe02be72bd9abe2a5f3c08fa4.exe

  • Size

    64KB

  • MD5

    3799963170fcfcfaa0018a518c0c8888

  • SHA1

    47e93d61871b92ef054b3938b8bc4155554e1cbd

  • SHA256

    b2e9676872a44efc96894c89af1f725f645bbfcfe02be72bd9abe2a5f3c08fa4

  • SHA512

    5919c6f155c14100458cd30eb74fbdbf3ec8edacdf855cabd2215006e544a3675fd360d940257185b9b9aef67547154002a2b3592337342f39a50969df6c26ea

  • SSDEEP

    1536:gUzp5/Ur2iwzWNyp7k1XXROdY25cJEJdTyhc01Z2RUG:dzp5TiwzWmkHv25l4c+a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2e9676872a44efc96894c89af1f725f645bbfcfe02be72bd9abe2a5f3c08fa4.exe
    "C:\Users\Admin\AppData\Local\Temp\b2e9676872a44efc96894c89af1f725f645bbfcfe02be72bd9abe2a5f3c08fa4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Deletes itself
      • Adds Run key to start application
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S34WV92F.txt

    Filesize

    539B

    MD5

    bd212eee107d73c37c57235e3505ede3

    SHA1

    7833ae8a4d6823ec44525811bd5f2e7e886c2327

    SHA256

    f1d9e7146a5168ef5ac322ed5f53d82b4981652707f70a50eb68af4fb2de501b

    SHA512

    543590641ae8cad067ed023bb5bdd03188e1ad74c32ef7f20d768ddf69a7690eaf3da3639da28128493fad70cb8efcbc8320157e302ed7e9525286da2594baab

  • memory/1716-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

    Filesize

    8KB

  • memory/1716-55-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1716-56-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/1716-58-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1716-59-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB