Analysis

  • max time kernel
    137s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 07:50

General

  • Target

    af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe

  • Size

    784KB

  • MD5

    4a8c32e241882d0f76039f6d60f0d2a5

  • SHA1

    f37acae4f941d962b1e707d44dfd64df18f79bfb

  • SHA256

    af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb

  • SHA512

    45f320dddc94cc7bce1d6155dd1e55d3d25284ab846c7d20ed5beb19fd5e4d86a267f8422ac8d5dcbfb75b7b59bb2acecc6ee609912856b6ac1e951a8a0c5615

  • SSDEEP

    12288:XPONB8Inb/lrxPCcKQ7PjnItj9SW+LgZe6pmvSl+IkvDFyQ0vBooUtq:XmNFb/lrN7PzMeSl+NQJa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe
    "C:\Users\Admin\AppData\Local\Temp\af6b8c79eebca7766ff86595862ef724b3f3e37c1d5ae6f7286b503cce7f7dbb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1800
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\AF6B8C~1.EXE
      2⤵
        PID:1132

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4412-132-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/4412-136-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB