Analysis

  • max time kernel
    117s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 18:38

General

  • Target

    bc46f35e8aff39c24d168bd3df1abb15f9e8bac53efc86c51642e60e1b426e8f.exe

  • Size

    210KB

  • MD5

    e4b58c1be22b062c0a1a789fff0effed

  • SHA1

    223d248b85f6ad2d6fdd30a9ea9cd5791241d2cb

  • SHA256

    bc46f35e8aff39c24d168bd3df1abb15f9e8bac53efc86c51642e60e1b426e8f

  • SHA512

    192d98eb2a4c3d7c618df25f9947b02cd9a37f13384f3c410f8c8c29a7617c5bc43280acfbc175f2a20b99ed990aea041a343f79fb0d0fb65b65d1f34e6aad89

  • SSDEEP

    3072:vzp5TiwzWmkHv25l4c+a3Fs45a90WYJl48YZY:vzjTisWmuvOl4c+OF/q0WYv3Y

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc46f35e8aff39c24d168bd3df1abb15f9e8bac53efc86c51642e60e1b426e8f.exe
    "C:\Users\Admin\AppData\Local\Temp\bc46f35e8aff39c24d168bd3df1abb15f9e8bac53efc86c51642e60e1b426e8f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\8YE4UIIK.txt

    Filesize

    537B

    MD5

    b0a7e9b8f5f2c8b5de2ffc9e036f8458

    SHA1

    ed624f3f6283fea78f11a8095c96d5a0c659a292

    SHA256

    aa0dde3d644137461450949b6eb47120a184078388db4f407b54ede687e80a2e

    SHA512

    8cb9247bc75fbc675766bb11c7639b2c5711bb8d0cb98e22cfa4ef7abcefcf8572817c3e370726aa4e372e6f891c85d4032572e967ae2362ac4a9bb8104b39d1

  • memory/1248-88-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmp

    Filesize

    8KB

  • memory/1248-58-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-60-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-62-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-64-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-66-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-68-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-70-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-72-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-74-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-76-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-78-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-80-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-86-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-84-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-56-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-82-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-98-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-96-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-94-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-92-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-104-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-102-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-110-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-108-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-106-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-100-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-90-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-114-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-112-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-116-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-119-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1248-118-0x0000000000460000-0x00000000004AE000-memory.dmp

    Filesize

    312KB

  • memory/1248-55-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB