Analysis

  • max time kernel
    145s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 11:00

General

  • Target

    c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011.exe

  • Size

    164KB

  • MD5

    888be35d9a36a08960ef8c80ae02a787

  • SHA1

    1eabfd616f841742fa71c47f5ec1812d82447894

  • SHA256

    c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011

  • SHA512

    3c2ef701a303461b12da38d2cbbcce956f514652489fa804b80deb939a00015394d92f50ce7644a076064f04130c54c6490bc6dffb18a5846141e1c30fef05b5

  • SSDEEP

    3072:NoszioJaBCYNdgVHRKDFJlgQc22yWSBB:NWKUNdQKDODD4

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011.exe
    "C:\Users\Admin\AppData\Local\Temp\c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011.exe
      C:\Users\Admin\AppData\Local\Temp\c47dabc6e63d2922b4bd9db5951d7c2c5d93233392bc81cd990fb0f3021f6011.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LMFPAI1U.txt

    Filesize

    600B

    MD5

    15a70b2aebf0abb51ded5525505d4f33

    SHA1

    9312faf5c41f4f97e59a04ae0c8083e4043aa986

    SHA256

    6e71320583ed6b8c8e6d023473a87d199956e5c661bb4ef16d065d3e7ec67586

    SHA512

    531fe95da761f4db07b414f7b108424afc4689067e110dc584860f9b908cf4fec79bfa56a006689a7b0e63053752cbb88427dff3c8105e2e0038fb1b4d4d38af

  • memory/892-88-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-92-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-60-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/892-61-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/892-62-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-94-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-66-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-68-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-70-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-72-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-74-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-76-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-78-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-80-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-82-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-84-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-86-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/892-59-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/892-90-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-64-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-96-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-98-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-100-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-102-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-104-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-106-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-108-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-111-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-113-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-115-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-117-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-119-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-121-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/892-126-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/892-127-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB