Analysis

  • max time kernel
    107s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 19:55

General

  • Target

    868b3b05cac802c5565ed286dd31bf184d6a4e0813c748f05806c6c229f4a64d.exe

  • Size

    528KB

  • MD5

    81ed1b45720716a6167f2d5a04e60ac5

  • SHA1

    df0a9b64e23c4787cfa1e7f460cfb0c334e86550

  • SHA256

    868b3b05cac802c5565ed286dd31bf184d6a4e0813c748f05806c6c229f4a64d

  • SHA512

    1f77b31d5cf0dee10ed15d60c01edcc7be178139b4c53f196294bab974f59bc945d099ef008bd1000482ca001380d156907581778a71851bc01223e2abe5a554

  • SSDEEP

    12288:+sP6ys+NgzZhkDjhYrBxoF50fee8cr/SuEmZiQdt5NkRuShyYyv:+YBNUfkC9+noefOEKiEXNjo

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\868b3b05cac802c5565ed286dd31bf184d6a4e0813c748f05806c6c229f4a64d.exe
    "C:\Users\Admin\AppData\Local\Temp\868b3b05cac802c5565ed286dd31bf184d6a4e0813c748f05806c6c229f4a64d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.au56.info/cqw.htm
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:620
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\868B3B~1.EXE
      2⤵
      • Deletes itself
      PID:1144

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\T9XOESIK.txt

          Filesize

          608B

          MD5

          2974bfd0ba2036ad454410961e47b3b0

          SHA1

          f7f54247046274f1e863f212d7c2d723f88bec0c

          SHA256

          ed312b4154fc1620d31fc0b6791e8d3603f8a6244c8beb3e62c792d4c0ec42b3

          SHA512

          d0d45ddf5a87513645b083829dcf9e9fd6a3ec0c7f40c7d1e498e3b82fc75686bfd135cd67cb75121b9b1b16884d01b0ec89e6895106ef11664fa9207571d18c

        • memory/1340-56-0x0000000000400000-0x0000000000484000-memory.dmp

          Filesize

          528KB

        • memory/1340-58-0x0000000000400000-0x0000000000484000-memory.dmp

          Filesize

          528KB