Analysis

  • max time kernel
    108s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 18:19

General

  • Target

    e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40.exe

  • Size

    164KB

  • MD5

    061c4e771260060a0389c7a349e95b28

  • SHA1

    5caed9b5704760e38fd7a9b71edced65f908b7b2

  • SHA256

    e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40

  • SHA512

    af414ba268279068b347a0b0db079a5634f2e0d71f6c7b59a4f7090528d5f4924c232344f66e7b3f720dc1cca9e919f419cce29d17f18b0e46d2e0b734d0acc9

  • SSDEEP

    3072:eb0cxytbwT0v0TYX0DudA20z1V2p+d08Ja4E7o6jiAZB3mv9:e3T5y/Ozn2pn8IF53K

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40.exe
    "C:\Users\Admin\AppData\Local\Temp\e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40.exe
      "C:\Users\Admin\AppData\Local\Temp\e958059c65088f205276030bf52e1c720ce071e351b517c51762cbf9124b2e40.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9HL5IDGR.txt

    Filesize

    608B

    MD5

    8539b3351e233adedefb0fd71b557c6b

    SHA1

    a4b13ef6b3cf3a344067e19219726c363d7f77cd

    SHA256

    7d5be748f7d2c63f6b1c8b8de9e2a370618ee63d16006e8fac23f6283f3990b7

    SHA512

    15044ba9d24ac84f501ef8365733952e591acc7922791c439195947899be5264b81235d2f3aa0711ffb4419eb824ce4a124dc123d6f6c6cd9bea0d8580f0163b

  • memory/1204-59-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1768-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1768-60-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

    Filesize

    8KB

  • memory/1768-61-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1768-62-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1768-65-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1768-63-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB

  • memory/1768-66-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB