Analysis

  • max time kernel
    41s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 07:06

General

  • Target

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

  • Size

    1.1MB

  • MD5

    094315b921f72798e2cdce1f09a6dc48

  • SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

  • SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

  • SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • SSDEEP

    12288:7J84D/9Hfe6rfTJ6Lt8urB7Nj6fsfqdm7pTTCIu0EuG2a18RzY47E9ELluv9Ny4x:7F7WXbqdUTmWK29ZY47EiLMYTHyL

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 7 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe
    "C:\Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe
      "C:\Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe" Track="0001101000"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 1416
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • \Users\Admin\AppData\Local\Temp\afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac.exe

    Filesize

    1.1MB

    MD5

    094315b921f72798e2cdce1f09a6dc48

    SHA1

    2ec3d4b8dc1f23fa6c41febb9889683cd058408d

    SHA256

    afd3eb2dbd0ee496aa49e9ce44d264b20bcbfa9c2bf522510220cfca49102cac

    SHA512

    bc59dcd3f935a03a9ab8eafcb2a735c160b114e744dccc578897e657e76af9cfe28df640dd7ee74d1698d6a9e5d70b4cfda3c87be96dbb2bb872ce782818327f

  • memory/1052-63-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-68-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1052-69-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-70-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-66-0x0000000000480532-mapping.dmp

  • memory/1052-65-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-55-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-61-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-59-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-57-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-54-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1052-79-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2044-71-0x0000000000000000-mapping.dmp