Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 14:41 UTC

General

  • Target

    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe

  • Size

    810KB

  • MD5

    81ded146c1ce63c97f79aa7600106375

  • SHA1

    6bbc794db626337519810f2e291b5bd5438804ed

  • SHA256

    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd

  • SHA512

    76edd733a74d3d13bc349778ec6324e5e14bb8ad1137ce2154182ebbc7f3d1687a85f86f6fb1e67662acf891c5537fc0dad15b69faa60453b2aa5c7bb405ebed

  • SSDEEP

    24576:0RXhWDdioZFalYwx4hWU0i52N6YVBpg2tBY5kWd:IsDDFpRp2btBkvd

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    "C:\Users\Admin\AppData\Local\Temp\aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1812

Network

  • flag-unknown
    DNS
    r1.redunder.info
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    Remote address:
    8.8.8.8:53
    Request
    r1.redunder.info
    IN A
    Response
  • flag-unknown
    DNS
    c1.rederate.info
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    Remote address:
    8.8.8.8:53
    Request
    c1.rederate.info
    IN A
    Response
  • flag-unknown
    DNS
    c2.rederate.info
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    Remote address:
    8.8.8.8:53
    Request
    c2.rederate.info
    IN A
    Response
  • flag-unknown
    DNS
    r2.redunder.info
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    Remote address:
    8.8.8.8:53
    Request
    r2.redunder.info
    IN A
    Response
No results found
  • 8.8.8.8:53
    r1.redunder.info
    dns
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    62 B
    141 B
    1
    1

    DNS Request

    r1.redunder.info

  • 8.8.8.8:53
    c1.rederate.info
    dns
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    62 B
    141 B
    1
    1

    DNS Request

    c1.rederate.info

  • 8.8.8.8:53
    c2.rederate.info
    dns
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    62 B
    141 B
    1
    1

    DNS Request

    c2.rederate.info

  • 8.8.8.8:53
    r2.redunder.info
    dns
    aef7b86d584efd6c4f478472e4f4680f7d1aeccb230b8c8add3fbf44e4d0fedd.exe
    62 B
    141 B
    1
    1

    DNS Request

    r2.redunder.info

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1812-54-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/1812-55-0x0000000002010000-0x0000000002193000-memory.dmp

    Filesize

    1.5MB

  • memory/1812-62-0x0000000002010000-0x0000000002193000-memory.dmp

    Filesize

    1.5MB

  • memory/1812-64-0x0000000002010000-0x0000000002193000-memory.dmp

    Filesize

    1.5MB

  • memory/1812-63-0x0000000002010000-0x0000000002193000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.