Analysis

  • max time kernel
    186s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 12:36

General

  • Target

    97d510407c1308c0bd20baf7096d74f36da03ef28fa9edc49d3b47f01628e276.exe

  • Size

    36KB

  • MD5

    5237ac6195e4e6626aceaa3812a78904

  • SHA1

    8f6e97795a6601b3bf619749155845e4c549001f

  • SHA256

    97d510407c1308c0bd20baf7096d74f36da03ef28fa9edc49d3b47f01628e276

  • SHA512

    3e4404dda883208cde310d25da80a3807f6e64a9ef0c8a918b5dc968ffcd03d7f838cb0228be134ba6fba7438458f51daf019c0db548205bd6961d08365e4b7c

  • SSDEEP

    768:/A/eg/zVRM3EqvvEbNUEnHrei6hDbAQQwgu97a0Eg:/A/fZRM/vsfei6Suhqg

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97d510407c1308c0bd20baf7096d74f36da03ef28fa9edc49d3b47f01628e276.exe
    "C:\Users\Admin\AppData\Local\Temp\97d510407c1308c0bd20baf7096d74f36da03ef28fa9edc49d3b47f01628e276.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1336 CREDAT:275459 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1692
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AAFB8111-733D-11ED-8589-FE63F52BA449}.dat

    Filesize

    3KB

    MD5

    bb4a40aa466603beb6295088d313e8c3

    SHA1

    4964ea700dbd04da05d42f2131e31a66aa9c4c97

    SHA256

    f67136c2c8e9dfcdaa2efa970afe0df1d39bfbb35789ecbc80809dedcc482d17

    SHA512

    b8f04eec15447f3a00f3e96954c235de8af4f5035697c976f5c0ca61bee9a040be0225dbc2db4070d1cc01412320501c1d23877792637ae7f9a072b11c892641

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{ADA1E8F0-733D-11ED-8589-FE63F52BA449}.dat

    Filesize

    4KB

    MD5

    759ae6f8319b7d615e0c6206f748443d

    SHA1

    870a05051135b5274dfc758a330907cbdc61829f

    SHA256

    131c143af03ef6bb8f0148002096a8140190be44c96212e14f3f23c99949c6fd

    SHA512

    350f07fbdf5bf32ce240a9e61a2f2e8f4bd7c4929d8bb08eecb9c9f4f731052b6d0a7038fbc296145ed2ac8d17dfcdf5b14a680e8f2307ea1674e13f6e26a4f5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3X76KEVK.txt

    Filesize

    539B

    MD5

    7c685df015166099afead355dc204761

    SHA1

    6e53cc6cd1ce87d2f4e8c34cf0302e1964f3b363

    SHA256

    7cf9a07fad86350b4db0d1fa551715ad43e3060e538f0d096e02c65eee338124

    SHA512

    befcc31cb1872a3c3506609f70e057230b82d33b48410b614697aa563dc4b38e4385915e39bdfa9ab0aaf766a115d83c3d31f999fc3f75a7e90cdadea87a5d98

  • memory/1256-56-0x0000000075BE1000-0x0000000075BE3000-memory.dmp

    Filesize

    8KB