Analysis

  • max time kernel
    180s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 18:37

General

  • Target

    11655726b5ee1d0805af4153da5a0a40510984159ea12ab6ca4a5ae28943a778.exe

  • Size

    2.5MB

  • MD5

    920adf2337a3c986780012eee89dec85

  • SHA1

    755cb96fc4d94f765ac81fc8a3f5c731bf658656

  • SHA256

    11655726b5ee1d0805af4153da5a0a40510984159ea12ab6ca4a5ae28943a778

  • SHA512

    d0c50ff0f83bd8c4f786a10356a5c76b177f3062c294eef58a3a24a062a889bb7b02ed81dd61676c710f8d0425190362e53b9e2cc7f9a362da852426377504e2

  • SSDEEP

    49152:FkgD5so7J/Z9Iezu0+enJXW0vsoBKOW+SuJx2wFmRHiiy5i0R2vQElEfwnMB0:1DmoBI8hvsoBKTluvbuVy5i0RMtlE4M0

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11655726b5ee1d0805af4153da5a0a40510984159ea12ab6ca4a5ae28943a778.exe
    "C:\Users\Admin\AppData\Local\Temp\11655726b5ee1d0805af4153da5a0a40510984159ea12ab6ca4a5ae28943a778.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4828
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:1092
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads