Analysis

  • max time kernel
    150s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 18:35

General

  • Target

    c1cbaf7a654a5ddc7d79b995e7c6584c4d4681669bee6baa294c903af2300a20.exe

  • Size

    322KB

  • MD5

    2c82dca1f27353a571c213251bf588c1

  • SHA1

    2401bf0ae80942cbc759e972ae86277a3bb12757

  • SHA256

    c1cbaf7a654a5ddc7d79b995e7c6584c4d4681669bee6baa294c903af2300a20

  • SHA512

    2c789cd7ab38dde63e3b92e0a5d8607908d7105ef1ce37a95f385ff219cbef9a391041b6232e1c6b534b15fd15686f9df73ad1c1012854fc654fd087b85119a5

  • SSDEEP

    6144:sZvuCYX6bmERmQ5J+I0EHpFEYTtHm5uz/Gs1FVYR/mv/ZsI:stlYXUYIDHNBG47NFVI/0h

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1cbaf7a654a5ddc7d79b995e7c6584c4d4681669bee6baa294c903af2300a20.exe
    "C:\Users\Admin\AppData\Local\Temp\c1cbaf7a654a5ddc7d79b995e7c6584c4d4681669bee6baa294c903af2300a20.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1992
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    c8b986f627844e4cd0a06dc0f12c114b

    SHA1

    1ea6fedf1ab29077707c3357d90de25ed6a15ee2

    SHA256

    8fed0e2f036dbed16af875407619f71c8886ae4fd60ef5a33aa2e83d98c2031c

    SHA512

    60be001ce3653a58f0c86d8adfd4455068f86f12d4b9f4978952eb9b72ceed4026ed3192fcf7207cf8d0242f29681f00d1149cd66bbf5ec9bcdbcf883ec89cfa

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OWP1YYBP.txt

    Filesize

    608B

    MD5

    fd2569ce63902cd1ae8733d526d56162

    SHA1

    c3110dfe6834bf607a46e74f9ce3b6e73c2b8873

    SHA256

    ce93a0886647354c67f52f09e934b0853382b7879f97ce735e06588ef3658aff

    SHA512

    a74cfe0df3ffb339c4d48fba132d68bf2ba45863ef045094725a993209defdb92e17d5d89cca9c87af86b30a4a08bea0e06b7b32a23f0068a16719eb9c167000

  • memory/1992-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB