Analysis

  • max time kernel
    3s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 08:16

General

  • Target

    b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9.exe

  • Size

    45KB

  • MD5

    8b936b3ae5b23deee98ab6e4b69e96ff

  • SHA1

    0f0b174454bd88b4d16d558a708684320a906abe

  • SHA256

    b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9

  • SHA512

    a7b6c5097e1e96a31a05698039fcceb8f77380affcff4f5787bffd09738722025e3fd2b7b92069fcb9fe6418e3cdac57c63d38ecca4dd65b410be84b75291a10

  • SSDEEP

    768:kRJ8sWszOYqYwi/bv4HoAOh3FHExerMFjbebE7YHibbbpiFt5VBb0VxOy0deysy:kRJ8sTzU/i/bv4HfOh3FkIrMF2bWb8Lr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9.exe
    "C:\Users\Admin\AppData\Local\Temp\b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9.exe
      C:\Users\Admin\AppData\Local\Temp\b55b75dd1108aeb9afdf043f2b3a08fae100bca44c68617945ef6472eb6e47b9.exe
      2⤵
      • Modifies Internet Explorer settings
      PID:844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-57-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2036-54-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB

  • memory/2036-58-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2036-59-0x0000000001CA0000-0x0000000001CC6000-memory.dmp

    Filesize

    152KB

  • memory/2036-60-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB