Analysis

  • max time kernel
    108s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 08:21

General

  • Target

    a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742.exe

  • Size

    314KB

  • MD5

    062c4f531e2b9a69ca4793702bbce655

  • SHA1

    9a067b350633cee209e8ed78aee5965d0b70ddca

  • SHA256

    a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742

  • SHA512

    fe93f430b9a2185e563e2985217e294685a6829bea0c2675de18bb028a4fb75447f1f5fd471dffd95090c12067d9becef37ab09fc16af8320e0347ab5352eb2d

  • SSDEEP

    6144:/oNkMkk2DxLqW9NJgmJglioBiM3sOjm6Mh/Xx9UoFiVb9GeUa89impfoS:/TVRN9wiHCGvxqIiVbAefKimpfoS

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742.exe
    "C:\Users\Admin\AppData\Local\Temp\a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742.exe
      C:\Users\Admin\AppData\Local\Temp\a310993cbcfb446e3b0fcbdcd0346718125fc290c4115836443b1b89c8b10742.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1196
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HCIMFVL1.txt

    Filesize

    608B

    MD5

    ab4e582d357caa6b4f4ee18efdccdd98

    SHA1

    0f1dea8dc646c6ac3fc05de5ce418ef8ce10128e

    SHA256

    36cd530d57b13f61b7d537e3cf1639885a0f327b3f5e11fc3627cfba74a0dabc

    SHA512

    428bec4a903e6c1c1a0162dc93a97ad9abaa88d71f3b983467620c89056ee1623878f2e85602ae81862d6325506a658e3a95cd72e4f92787905c399ce618f395

  • memory/1764-61-0x0000000000400000-0x00000000005F4000-memory.dmp

    Filesize

    2.0MB

  • memory/1764-57-0x0000000000400000-0x00000000005F4000-memory.dmp

    Filesize

    2.0MB

  • memory/1764-59-0x00000000028B0000-0x0000000002AA4000-memory.dmp

    Filesize

    2.0MB

  • memory/1964-89-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-95-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-63-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1964-64-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1964-65-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-97-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-69-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-71-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-73-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-75-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-77-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-79-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-81-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-83-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-85-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-87-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1964-91-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-62-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1964-93-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-67-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-99-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-101-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-103-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-105-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-107-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-109-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-111-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-113-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-115-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-117-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-119-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-121-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-123-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB

  • memory/1964-128-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1964-129-0x0000000000280000-0x00000000002CE000-memory.dmp

    Filesize

    312KB