Analysis

  • max time kernel
    152s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 18:44

General

  • Target

    57a0274ab44fd2e041a857434002a2ffed2cf88b70c2a04d89ea9298ead9e38c.exe

  • Size

    778KB

  • MD5

    4be297c7a63946041c7f05557ea182aa

  • SHA1

    b4ff8b5c39cbaba9f4d4410f370510f45aec377e

  • SHA256

    57a0274ab44fd2e041a857434002a2ffed2cf88b70c2a04d89ea9298ead9e38c

  • SHA512

    e88fd51e3d5875e3f3c3be30b3d902ee92cb7ac8e065a773a3bf5bdd8a9efd38632f26f2aa86220cbad2368759ba84a9e99e979f4b1e86473254d59a0cfd437c

  • SSDEEP

    24576:szYXUwqPoOb4KvSPwnxzItMYa9jOZnZ4NtS:Fk9PoO0wnxzyaUZnZ4NY

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57a0274ab44fd2e041a857434002a2ffed2cf88b70c2a04d89ea9298ead9e38c.exe
    "C:\Users\Admin\AppData\Local\Temp\57a0274ab44fd2e041a857434002a2ffed2cf88b70c2a04d89ea9298ead9e38c.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:2540
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:2040
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\zpu22o1\imagestore.dat

      Filesize

      1KB

      MD5

      9655fee482c17226221d2eacc024c520

      SHA1

      05cd369742da262548859c16c8a294083095b08b

      SHA256

      c928db07c06ff6050a7352d71d08a120983fee3923a88f582c8bfa4add188aab

      SHA512

      b81c57c0a30293e342f06eb164b45e7f76fac90811a6e5c2d78ee60d1ad7ea3446ac18fe0bd75cb63f3d7ed3af76226be385957307b3beaeaed72dc5d7470748