Analysis

  • max time kernel
    151s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 18:44

General

  • Target

    6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe

  • Size

    686KB

  • MD5

    64a9ee7537ec93bc5a60ceebb7638c1c

  • SHA1

    4be5195839b571b099815da71555775894e74cc1

  • SHA256

    6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266

  • SHA512

    06217ce598514239243f06f781acc511c814ab29070cc125b4eb634649c7e194e50b4d2f6b5b52e6f192d1c6e29f3ddc943b841dfdbef90e656804a6b93e7961

  • SSDEEP

    12288:stlYXUDyZH6ecaWJK0CWsQkBsHW30aOIuG1C12icqqpBPsWj2w3Ip:szYXU0H6ex5ymsHW30alud2XqyPsWLYp

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe
    "C:\Users\Admin\AppData\Local\Temp\6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1108
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    1KB

    MD5

    6c8c3a914699dd6ea2cca9f33407c339

    SHA1

    72622d55d0f8df11c63d46d77f5e3f594bc22cd8

    SHA256

    965ab30c84c0be5b155639c76260749b0ad7cc29bc2ca140f834d841ddc78664

    SHA512

    05bff62fda0d9fd9198a22ed20e8d620361b5bc54b5466a010ddd41bf1d33fe0952828b3029f858671eedf1a3d535ec287244d67d8f87138ddd4ccc2f717f6d9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UDXLXG6Y.txt

    Filesize

    601B

    MD5

    cf0d127d0a7451f45561d5b94776e31a

    SHA1

    37bd62d2118084a97b7e47a0ffb9e36cb7db91ff

    SHA256

    d7402e5f44320e8e5159c22925d53c63e0fffc5132be913b5e1c1215f82cee44

    SHA512

    b9d00135650554d5a62d72aac5d10c2cc501b25229690f3781a631539087986950e148647ee107bc85aa8e022ae5e31bba9a46cd65ed891f9b86824974897dad

  • memory/1108-54-0x00000000767F1000-0x00000000767F3000-memory.dmp

    Filesize

    8KB