Analysis

  • max time kernel
    147s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 20:50

General

  • Target

    cbacfcff869473cd66a002ffd9f05f1c468f2f304bcef24d2de9e69a990b0adf.exe

  • Size

    245KB

  • MD5

    b66b10b91307379caf58a5aa03d0aa3a

  • SHA1

    43e12f7b25ef2cbc4a45cfbee062553846884ce7

  • SHA256

    cbacfcff869473cd66a002ffd9f05f1c468f2f304bcef24d2de9e69a990b0adf

  • SHA512

    7aa933de5752f89856c80e526da77ec2daefd49a02d7ef905382a25a54cbc46bfc56ab98bfb4de895e0dcc53b394ea08b2a87969421a21555b34d820e6b93361

  • SSDEEP

    3072:sZvuCErCoXkdbTLBAMrAEi9/axmQ8iJk4X+mmR3peBm+dbTLBAMrAEi9/axmQ8iA:sZvuCYX6bmERmQ5JK3WbmERmQ5JK3/

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbacfcff869473cd66a002ffd9f05f1c468f2f304bcef24d2de9e69a990b0adf.exe
    "C:\Users\Admin\AppData\Local\Temp\cbacfcff869473cd66a002ffd9f05f1c468f2f304bcef24d2de9e69a990b0adf.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:1664
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{D5E8041D-920F-45e9-B8FB-B1DEB82C6E5E} -Embedding
    1⤵
      PID:4792
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:696 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4256

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      2e02780939de763a8bb3e91dfbf21980

      SHA1

      47e818dcbc1d307b43654dfe3a03b9a7625d9ce4

      SHA256

      971abb405a443302f8c61627933bd0f46ed6953f5815e298974e6f7532908748

      SHA512

      51709ae31e885719d848f619c4b3e732b0765a5349484f7c4ca524072a6b0d75f33d3f6c015a0ed4fd188a43d5cc9e0d221d1d7cca5a31a044b73fcbcebbe5fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      5d0a5f196f9052ed2f92af7c1bb9c939

      SHA1

      7a8da99648bea4a84c3f02825a67476a22a8e1e3

      SHA256

      f0f440f3afd7f6dcb2b0fb82a82b712103edd40ae3bc36da9eac020561823d70

      SHA512

      b5044a73496de08a9adb3711a5e2d787b2ad26ed1d34f8bc41b83f3796c9fd6da93cd1cdba4d8b14e4d57b9e0f8e31d3cc1ed728f21aff69c40aa5a25bf4faa0

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

      Filesize

      1KB

      MD5

      68a0576e5d501d9fb03714f24f228c32

      SHA1

      b9a73171ae45d59a1ff451a2ca1d165a7bf842fa

      SHA256

      7dc7fa1011f5dc0ec32f4fa766e42f3a93b4cbd47176844b0e2afffc3da4f289

      SHA512

      184e188ae5cfa86b33d64837f9c680af6b1ff2893df8aee49a10829e3566aabff30deefea08c714f83156c9871c690ad465baabf19824be107c5f46fd646138b