Analysis

  • max time kernel
    98s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 07:50

General

  • Target

    af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe

  • Size

    784KB

  • MD5

    4a8c32e241882d0f76039f6d60f0d2a5

  • SHA1

    f37acae4f941d962b1e707d44dfd64df18f79bfb

  • SHA256

    af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb

  • SHA512

    45f320dddc94cc7bce1d6155dd1e55d3d25284ab846c7d20ed5beb19fd5e4d86a267f8422ac8d5dcbfb75b7b59bb2acecc6ee609912856b6ac1e951a8a0c5615

  • SSDEEP

    12288:XPONB8Inb/lrxPCcKQ7PjnItj9SW+LgZe6pmvSl+IkvDFyQ0vBooUtq:XmNFb/lrN7PzMeSl+NQJa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1712
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\AF6B8C~1.EXE
      2⤵
      • Deletes itself
      PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1LCQQMLK.txt

    Filesize

    603B

    MD5

    71e5f48ba5dae590aabbda07474ea25d

    SHA1

    dda331f114574612fbd3717387d746bfa739229c

    SHA256

    b55141965485ad4462872383e7e8b952b85d80c582ca1dae647b6a17206ea453

    SHA512

    932451b1145b5f73b3ab295fe7dacc60639b132ee96a29a8fdc8437721f4a2f22b73b6f3e993fdd99a22d6507da2289ea92ff9dc2f087d8a644f816b0a6a21bc

  • memory/620-57-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB