Analysis

  • max time kernel
    112s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 04:48

General

  • Target

    5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c.exe

  • Size

    92KB

  • MD5

    6ae619eb37e600d8f741fda8ec497a1a

  • SHA1

    d424d6246cd042447c56fea5ee167d402a0a9566

  • SHA256

    5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c

  • SHA512

    d978bbe5cc531dd67bef86006c8610a41b7577eed0cfb6aa337270f30ad5cb7bc02c441bd64d6be48075e410578062f12976555b4ee1f3b93abe82006f39b605

  • SSDEEP

    768:bxu1yiBh/CiCREDjAncmlNV9lRsOw83/q0HssALrt0NdKY3dRnVms2ceydgOZoqn:bxyv6NVHkMja6NdKiI2dgDqlqIHUsQp

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c.exe
    "C:\Users\Admin\AppData\Local\Temp\5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Users\Admin\AppData\Local\Temp\5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c.exe
      C:\Users\Admin\AppData\Local\Temp\5b64fe2737cb86480b93bd722034904076ec6ac8b4c9cc6f4c37683bdd62e50c.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1772 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B0R3IILJ.txt

    Filesize

    535B

    MD5

    acd0bf7fe84530dc12183ea2fb09d8ec

    SHA1

    5f4839d1844db7a2b46e1853668cdcbd5404b577

    SHA256

    5aa9d95495ca07f08c0552112a26ac7f402db7c8c5060055b00f98b5abe7acc1

    SHA512

    25cff24d45cfc4482687b2228e164717cff2affe36f8e2ca6e6947b06d1d1001ca60a375840ec853c0bb12808d45881b7288f23c9f84647ae5bbd364d385e936

  • memory/1676-104-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-136-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-57-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-59-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-61-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-63-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-65-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-66-0x0000000000410910-mapping.dmp

  • memory/1676-88-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-70-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-71-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-74-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-76-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-78-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-80-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-82-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-84-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-86-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-90-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-102-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-94-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-96-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-98-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-100-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-92-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-135-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1676-106-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-108-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-110-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-112-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-114-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-116-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-118-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1676-120-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/1788-54-0x0000000076321000-0x0000000076323000-memory.dmp

    Filesize

    8KB

  • memory/1788-67-0x0000000000230000-0x000000000023F000-memory.dmp

    Filesize

    60KB

  • memory/1788-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB