Analysis

  • max time kernel
    89s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 09:56

General

  • Target

    98ea752c554681d6cc83d840f8204c2e94e36c99608c2684b4c5d5112abad043.exe

  • Size

    431KB

  • MD5

    90ba6b89e665fa78866e60a7f2e11ccb

  • SHA1

    6e6e0c2a8f985ac3d997812af3e57f250d125b03

  • SHA256

    98ea752c554681d6cc83d840f8204c2e94e36c99608c2684b4c5d5112abad043

  • SHA512

    02f0f94df888245497ae7e4371f9512b60b2ccb20b6097596629f04ea684387d12e8931c205c4a5a2832882e06d2cad3374196cd07839a89cc90a0716ae4de23

  • SSDEEP

    12288:N90GvvX84eyOYcJyicw3+ojvkpBHYf6PfWv:P1M4eyOzMih+K8vHYS3

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98ea752c554681d6cc83d840f8204c2e94e36c99608c2684b4c5d5112abad043.exe
    "C:\Users\Admin\AppData\Local\Temp\98ea752c554681d6cc83d840f8204c2e94e36c99608c2684b4c5d5112abad043.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2032-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

          Filesize

          8KB