Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 17:51

General

  • Target

    c854bfc1ecaea357c9f68a92a072fadf5a68859c9d6e2135105482ca32965c71.exe

  • Size

    175KB

  • MD5

    e23a699944666f3a2d46aec8bc1d3be2

  • SHA1

    5bfbbd078421338371f22a95ad1b20c24834d2e1

  • SHA256

    c854bfc1ecaea357c9f68a92a072fadf5a68859c9d6e2135105482ca32965c71

  • SHA512

    f53f612abf88d9738d94e6baa656a3f21013dad502d0b22003e922569c376a42792602ee8b652a74c5bc4dd57f632191723ba43adebfb853bc59128cdf36229f

  • SSDEEP

    3072:dH9aEOSVggdxrEtlLXFjsyaEqjB98t78PqaAPd4j/515xg2PUyVq6TRe5:ddxbEtFWBjD8gVB13q6Ve

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c854bfc1ecaea357c9f68a92a072fadf5a68859c9d6e2135105482ca32965c71.exe
    "C:\Users\Admin\AppData\Local\Temp\c854bfc1ecaea357c9f68a92a072fadf5a68859c9d6e2135105482ca32965c71.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\aprev.dll",GetRecordPosition
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1868
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275461 /prefetch:2
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • \Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • \Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • \Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • \Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • \Users\Admin\AppData\Roaming\aprev.dll

    Filesize

    175KB

    MD5

    7836615e34f0d5b6b2999dc10c1478d0

    SHA1

    6022d67bba527107a79cfc06da6b78a246e66a01

    SHA256

    3653101129597429e06c86808cd7de14154c1322215f87ffa14cd05adcb1b1c1

    SHA512

    9d3db22e5a47ab02fd2b8a11c8333d5be7896702467d518632354abcab081dfe4cbbe29e67fcf78de65bbc6ac4784033410fda6b1784862ed185db0f0bf7749c

  • memory/960-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/960-56-0x0000000000250000-0x000000000027E000-memory.dmp

    Filesize

    184KB

  • memory/960-55-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/960-72-0x0000000000220000-0x0000000000237000-memory.dmp

    Filesize

    92KB

  • memory/1868-68-0x0000000000120000-0x000000000014E000-memory.dmp

    Filesize

    184KB

  • memory/1868-73-0x00000000000B0000-0x00000000000C7000-memory.dmp

    Filesize

    92KB