Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:50

General

  • Target

    80489f61a6971d36ca46a467e423e09c30d2d0360e199375544b084766935a8e.exe

  • Size

    1.1MB

  • MD5

    9bea69ceeab490218c7036d6c5ccc3f0

  • SHA1

    3634de5fc843cfcb8ec7afc0e307afbc778fbf58

  • SHA256

    80489f61a6971d36ca46a467e423e09c30d2d0360e199375544b084766935a8e

  • SHA512

    273d117ad76ac4a2aa6b901e7d8ab856459b6d08dcd8f164d41307b4ad832adb5db71fada07f920de4243a2bccf91af8f539c5866d5fabfdcd200474db2b3d49

  • SSDEEP

    24576:szYXUEmlntwVl1KcZ25qTf77E2LTKn689Ho35jMxoNQe9t9x2/I05nqHzHN:FkdtwV+cnhLTKt9HoRSeGNqHzHN

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80489f61a6971d36ca46a467e423e09c30d2d0360e199375544b084766935a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\80489f61a6971d36ca46a467e423e09c30d2d0360e199375544b084766935a8e.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1284
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          5KB

          MD5

          1add06d68b689877fbf047caf4c9dd0c

          SHA1

          9385fdea5aac6b8b4e396ee414350917ab35737f

          SHA256

          e3412c37747b17ff3251a955f32cf908006649bf2f467c97601812479828f8de

          SHA512

          42b3363b5ab0f627534bcd21ac7936c71dc1bec2b15a8533c2d05542e9f35458b7d503cb5520e19eda7420f9e0d2331d36d0e26b1506e4d4072a3f1c1b1d7fd3

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VYD4FKV9.txt

          Filesize

          603B

          MD5

          ad7b8787ba4bc126597915758f7f2452

          SHA1

          eb21f4a7718cc776727de7d0665c829252c4ab5b

          SHA256

          77cbee0c4969fcf80faf1f0c9b52eeaea466f8f1c29d9a7d2285454d487b7d06

          SHA512

          80d66552444a5fe2f01bb35506a56069ee5ba664073d8cecdfdca42c1ac1fbaa3ea2a90135e0ad20679e9e296ba599354e7ac53558cdca72d6700d853c8e0b95

        • memory/1284-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

          Filesize

          8KB