Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:12

General

  • Target

    8204e07bfa29aab98720124bf196dedf9fff662e32d010e4aac04294a965a301.exe

  • Size

    361KB

  • MD5

    5846c7fb4626e9c450a0d85e4c0495a7

  • SHA1

    7a22cc181f2cc5deb49d78b837897087e73686ae

  • SHA256

    8204e07bfa29aab98720124bf196dedf9fff662e32d010e4aac04294a965a301

  • SHA512

    8203f9b12fdbac7de224607df47a29bfa29f6b16c4c3ac98c59a654e1acf40fc0375235c9500ebca9eddf189de03d9e3cdd5d9e525290c3899f235780accf47c

  • SSDEEP

    6144:HflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:HflfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8204e07bfa29aab98720124bf196dedf9fff662e32d010e4aac04294a965a301.exe
    "C:\Users\Admin\AppData\Local\Temp\8204e07bfa29aab98720124bf196dedf9fff662e32d010e4aac04294a965a301.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Temp\bxkgzuqmawokgcpi.exe
      C:\Temp\bxkgzuqmawokgcpi.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1724
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1644

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\bxkgzuqmawokgcpi.exe

          Filesize

          361KB

          MD5

          ad673f784129bed06fe3960fdc8bb9f2

          SHA1

          1403a5a770176029ee09f3c973a1b198391ba187

          SHA256

          4decdd09f13b7590d6553cdea998b438d8d3648a5043a2d64f1552aad9defe92

          SHA512

          6ba26e179700d981b0799cd8c00fe7f8275f9fb614c4a0cf5f1ea5368a637f2d6dd6ae3a03214213ef5e746a5cb0426133691ed3dc0052f27aec0b9d6df6c6e9

        • \Temp\bxkgzuqmawokgcpi.exe

          Filesize

          361KB

          MD5

          ad673f784129bed06fe3960fdc8bb9f2

          SHA1

          1403a5a770176029ee09f3c973a1b198391ba187

          SHA256

          4decdd09f13b7590d6553cdea998b438d8d3648a5043a2d64f1552aad9defe92

          SHA512

          6ba26e179700d981b0799cd8c00fe7f8275f9fb614c4a0cf5f1ea5368a637f2d6dd6ae3a03214213ef5e746a5cb0426133691ed3dc0052f27aec0b9d6df6c6e9