Analysis

  • max time kernel
    92s
  • max time network
    182s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 08:30

General

  • Target

    d5fcc4ad2fd2d4c85ec96be046a969b7862dca282b93b0782dd6e691854f2a14.exe

  • Size

    1.4MB

  • MD5

    1dc23488e0136f7677cee72b9f8dce20

  • SHA1

    e6495d6ab1234c50755ba52db8f2b3f1b5832724

  • SHA256

    d5fcc4ad2fd2d4c85ec96be046a969b7862dca282b93b0782dd6e691854f2a14

  • SHA512

    23f383a869cab16a5d96ac78cf964861e045f132e53ba597cb821a8e3db9a04e8f37642e34170d442da240529de104a06fbd9761f91cd8492101b224ed2e53c1

  • SSDEEP

    24576:GzAuqswf7i38I/Cpz7v/QEmBIaHl39JktiQjCbaxd/zcF4Pa0/rQQx+J4veZ0a8z:lJiT/ofnABIaHzOiICbqzcF4drp+WZxz

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5fcc4ad2fd2d4c85ec96be046a969b7862dca282b93b0782dd6e691854f2a14.exe
    "C:\Users\Admin\AppData\Local\Temp\d5fcc4ad2fd2d4c85ec96be046a969b7862dca282b93b0782dd6e691854f2a14.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.a585.com/?down
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JL6TMUOV.txt

    Filesize

    604B

    MD5

    7843f50b49efeb8ffb302f97fa6a8bb3

    SHA1

    0576b3c6b15804b0bc1be52cea8284ae33fc1e2b

    SHA256

    4014f2a3f20485258d515bf24ae29b6d9b51e53247b7d402ec9e81d2f534ab6e

    SHA512

    10893efb126d13ba05e208b5739f07e3012e3f311e59fb5caaf3bb82958a7f4cf3fadccbe27ee32afa408273970097c1dfcd086d091f79ac0b352abda96ce762

  • memory/1368-56-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB