Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 18:44

General

  • Target

    6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe

  • Size

    686KB

  • MD5

    64a9ee7537ec93bc5a60ceebb7638c1c

  • SHA1

    4be5195839b571b099815da71555775894e74cc1

  • SHA256

    6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266

  • SHA512

    06217ce598514239243f06f781acc511c814ab29070cc125b4eb634649c7e194e50b4d2f6b5b52e6f192d1c6e29f3ddc943b841dfdbef90e656804a6b93e7961

  • SSDEEP

    12288:stlYXUDyZH6ecaWJK0CWsQkBsHW30aOIuG1C12icqqpBPsWj2w3Ip:szYXU0H6ex5ymsHW30alud2XqyPsWLYp

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe
    "C:\Users\Admin\AppData\Local\Temp\6f74ef0e94b8e6a36bfe9694f8365998a50ad79a9885e1c071b59407e7fb1266.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:4464
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:3436
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4156

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      2e02780939de763a8bb3e91dfbf21980

      SHA1

      47e818dcbc1d307b43654dfe3a03b9a7625d9ce4

      SHA256

      971abb405a443302f8c61627933bd0f46ed6953f5815e298974e6f7532908748

      SHA512

      51709ae31e885719d848f619c4b3e732b0765a5349484f7c4ca524072a6b0d75f33d3f6c015a0ed4fd188a43d5cc9e0d221d1d7cca5a31a044b73fcbcebbe5fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      c650218412ae0995d1b3c3f4cb639b1e

      SHA1

      9904fad43629a593942b8ed2614e23314b26338d

      SHA256

      8309bb52000b12eec5f53f27ab2f20c41f187f735c3962bfe90755728096db94

      SHA512

      62584e5695f45ca3ff0ac8f1a04b8e60cd5a714dc1fd85ea078e3f7d5d900f06fcd11b5a2271db662b66c0dbdb1310c3d53155540f4a7e7a5961e9604b483e19

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

      Filesize

      1KB

      MD5

      d3602dd97156590d9dadb5b519e22382

      SHA1

      34e94ce172fc82827863e7d7992191c740fbd867

      SHA256

      a78f26dfbf0030029a4845fcc63e2d2853b976d62d5e94ce0ade01e5d1e4753e

      SHA512

      29a2b739920e91cfe059a912aff82ae815d50b507a9558d866dc5088d67f2fa36fc2a8e530fd3ac8da6f82c7648a142b11cb2cb23a2e1537e04654d24da9c937