Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 01:27

General

  • Target

    70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe

  • Size

    431KB

  • MD5

    4ba2a6b084531f18618e9dcf0c0167a7

  • SHA1

    26034520747748d89c525ecb2b0ff8133a19524b

  • SHA256

    70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1

  • SHA512

    1332b5e06cc0c3c5d6734a7c3dd8e138b168145ab1ac091e996d6cbd8174130a6aaa5d4ea7a460cbfe9afaf3d6af9001ec03615caf42586997937a476d5f9064

  • SSDEEP

    6144:BcotZ5JXEufZNOwQj2HgBAf/bflYBMiFWMF8P05V5rSdZS/bq:Bc+zJUuxNHQCHgu/bfniFnqPoVSQ/b

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe
        "C:\Users\Admin\AppData\Local\Temp\70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe
          "C:\Users\Admin\AppData\Local\Temp\70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=70e398724dd582c31adb2bc107e47ea13dafa40917cf031d00e029f8444794e1.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1236

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OX12ZPDY.txt
      Filesize

      608B

      MD5

      b2fa827c71fe32279f7212add0f5306a

      SHA1

      b969befc92b281dcca045783bbc1c422eb3e0a69

      SHA256

      355747cc784c09c9a31ea977204d395725c7b8528cbb88e1d1919c230136ccad

      SHA512

      d6bbbad5ff4b128589557ea97b7bfb879b85ff0d6ec25d65d7dbdbb3022a9d53d2876bdbfdc60f00d490be164e68c931f9ae10d6e45f012b2002a47b57c82ccd

    • memory/1284-55-0x0000000002680000-0x0000000002681000-memory.dmp
      Filesize

      4KB

    • memory/1928-54-0x0000000000000000-mapping.dmp
    • memory/1928-57-0x0000000076031000-0x0000000076033000-memory.dmp
      Filesize

      8KB