Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 09:25

General

  • Target

    9aacac9f30efc8027c03b868081cd8a29de7f3f66a83ac4826037ab830074a75.exe

  • Size

    82KB

  • MD5

    02ce245dda31d6c71fa76ece7a40d180

  • SHA1

    7cd5001312d9cd2fc82bfdb48f73010fd4ae3aab

  • SHA256

    9aacac9f30efc8027c03b868081cd8a29de7f3f66a83ac4826037ab830074a75

  • SHA512

    ff8b72da0089f4c91d41ed7730285df1417de71137c744379aa6b9d0377d83077aa694d1ff4a43c791e7172b574c3647b94810c59fb8bf1642363469c62eaa9a

  • SSDEEP

    1536:R6KDqIaiMHQC4DGjP5dEINWu7ajYEYGMe0mN+CkjvHjnyppguRQxg+HdU/cOC:R6KgiCQC4DGTDD5ajYErKmNo7nKpDitT

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9aacac9f30efc8027c03b868081cd8a29de7f3f66a83ac4826037ab830074a75.exe
    "C:\Users\Admin\AppData\Local\Temp\9aacac9f30efc8027c03b868081cd8a29de7f3f66a83ac4826037ab830074a75.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.on86.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4872
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.xingkongjisu.com/flashplayer.htm?52c
      2⤵
      • Modifies Internet Explorer settings
      PID:544
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9AACAC~1.EXE
      2⤵
        PID:632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      a62e66dbd157955d60808bf89987bcde

      SHA1

      a97e8478902ac7db7fd904300304944a41afee8e

      SHA256

      d34e72ae586b00a60e3526f1e75677dcffa83fd33860a771ae592e7d8320cf25

      SHA512

      2c969c621bd5881acf47e85b3a2977b1c43dfa80887f0ab447327162d143795ff647b8ed1aec174a868c0faf1e09eb8baa6a67ea42764b65fe4416d2168e81fc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      9227ea866316287e13bdbc2c64532d74

      SHA1

      fba3533c79d32ee2f7f5ad5e9effd899677b5633

      SHA256

      864fe0a2cc5ba642eef005a5d167da18dfc0ace7c48ddaee43dee83691d171c5

      SHA512

      20864ee3b5f97237e45ddc27da5ad7f83d34f0b77b9409772b534a58e94f8b2bfa8034b8f14587cd631d877d4b67f7400c5d9c17873dcde1ad4d237d04843f22

    • memory/632-135-0x0000000000000000-mapping.dmp

    • memory/1756-132-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1756-136-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB