Analysis

  • max time kernel
    110s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 03:06

General

  • Target

    75f19365a44771e6d0164d8ce01195df2ccb6bd383f056119215d389f45f5a7a.exe

  • Size

    331KB

  • MD5

    50be6d8299daf5181d8b97013a067844

  • SHA1

    18bc1d6417fd5d34b7d47678e2a139cee0816a37

  • SHA256

    75f19365a44771e6d0164d8ce01195df2ccb6bd383f056119215d389f45f5a7a

  • SHA512

    b9fee8d8aa029ae18ce8d1135070bbd881aebbc0c29997e5d15d88d2d1003d95289955e243f34a09ed636bfc66968a7a08360cf3adf90836b3be3e553ae41198

  • SSDEEP

    6144:/YJQkqiKYkTzlGz9gOUb2GBqoOkR6loMnKXAOkK7A+Q9PZQgre7sapV:QJbqiK/lGRgOUqmq9kR6lhKXSK7hcRQp

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75f19365a44771e6d0164d8ce01195df2ccb6bd383f056119215d389f45f5a7a.exe
    "C:\Users\Admin\AppData\Local\Temp\75f19365a44771e6d0164d8ce01195df2ccb6bd383f056119215d389f45f5a7a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=75f19365a44771e6d0164d8ce01195df2ccb6bd383f056119215d389f45f5a7a.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IKUGCV7U.txt

    Filesize

    535B

    MD5

    81df856ec4576869eff97c73de61b776

    SHA1

    fbbc8f470ee512e7fadad69f289452aeedf6bca9

    SHA256

    82e05486a133195315a1b0c7173e5ec6e147ae007cc3ca0960a6dc1ff5b9a3b3

    SHA512

    b6ec590ed6854073fdd5c2774cf7ddd1ed1965b23ed2223a19c5d62edadaa3e53478195ad111fdfd2cc87c6b51502a802984db1d183e0fd4274c6277b55d0d5a

  • memory/1648-54-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/1648-55-0x0000000000310000-0x0000000000370000-memory.dmp

    Filesize

    384KB

  • memory/1648-56-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB