Analysis

  • max time kernel
    105s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 21:32

General

  • Target

    c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c.exe

  • Size

    5.5MB

  • MD5

    7f64847bd5bf10cd0439e724ffaafd58

  • SHA1

    37aee1067b63aee52ccf2a7511ceec091f0f6a12

  • SHA256

    c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c

  • SHA512

    92365c1feba983c115f3779476d8666ef1853c41960e76c322f2d2e721d7a0de7a69abd3e9f9f990b6030c6e818e187b63fc788b39ec2e840121b561a774731c

  • SSDEEP

    12288:qCDZR9iR5Qu4Kk75Ox0Bj1POrJkGBABYAa5wH0Nb:qCDZR9iR5Qu4Kk75OBrJkzYXCUF

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c.exe
    "C:\Users\Admin\AppData\Local\Temp\c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1640
    • C:\Users\Admin\AppData\Local\Temp\c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c.exe
      "C:\Users\Admin\AppData\Local\Temp\c1aa9a19892997e175baf437b66900adf6bbcd670707504aa005742d52e31c4c.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ILJWKN14.txt

    Filesize

    608B

    MD5

    3ec14d72038a45d2c0c821adb2b1a383

    SHA1

    96ccc7cdef1acfb53831828d6d9c35d0099706cb

    SHA256

    ea01f35bd2483c0c079d755520ca8e9b72f09f5cbbf9601eba2e93cc8a8027dd

    SHA512

    465d59a54fa8f66743a6e45ba160be9a78fc5999ddac0b34cfc7801c89902c75f3eb4d9652041da9ff7df17c76ed2aad9a0f6d7248476fba9bf0e32a00579223

  • memory/1300-56-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/1484-57-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-58-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-61-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-64-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-60-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-67-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1484-68-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB