Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:51

General

  • Target

    6b96e0007a49eaef5fd31cad551563f33a347f361c2c5e4c6abc37ca0d0d72af.exe

  • Size

    208KB

  • MD5

    267e574b090a153c35668fa6ab9f4e01

  • SHA1

    7dc8402d0435788dd90e162477e56a54b7efa553

  • SHA256

    6b96e0007a49eaef5fd31cad551563f33a347f361c2c5e4c6abc37ca0d0d72af

  • SHA512

    6588c984cb102777b888e85c60fe6107eb19acad8905f0f2dd8cc1e8d60691c0683a0edde105a569d84154a931eb058d91423c3e0f13f1ff6830298f8923a39d

  • SSDEEP

    6144:sZvuCYX6bmERmQ5Jt0cQ5w+QmNIkGGLfw:stlYXUZQS+kT

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b96e0007a49eaef5fd31cad551563f33a347f361c2c5e4c6abc37ca0d0d72af.exe
    "C:\Users\Admin\AppData\Local\Temp\6b96e0007a49eaef5fd31cad551563f33a347f361c2c5e4c6abc37ca0d0d72af.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1184
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

          Filesize

          5KB

          MD5

          c7cb65dd79566e1aee6a7c3fb3a7b42f

          SHA1

          34c17f79a5ccdc2d14ad31f79cf3afce1b98e421

          SHA256

          f3b881e10bbcffce6470f08371bf48a9fee1b6c3fba5116a1c0b476edd856c26

          SHA512

          e8faeb07fb3111501c3a3dd0f4b3150cf9b7be92def35b8c01ae480731db4826858ab2e03a4c0ac3471b92fd45062c1ce2dd7a0c8ff2014526ac20a51445623f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1YFBOE3C.txt

          Filesize

          606B

          MD5

          0547be2e99df0184cf48ea308d9b327e

          SHA1

          2f2005f22c75c7fe2c464ea424d7d77394facbe5

          SHA256

          7af7493aa89c4560113ec289a9156fb8e40d421499c37a398c3e98a4bfab84ea

          SHA512

          4a368da6f6fa08197b9bcc8548056a3a795435e6e59bd88ce4f7af243cfe519e5683fe7ca73c195cefeeacb5dc1dc7e4e1112f1f5c9dc420953ecb830668b364

        • memory/1184-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB