Analysis

  • max time kernel
    126s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:54

General

  • Target

    e4e90d2701acf5dc70247f2adea895e3fe52e2da5843a77899fb65d706078cec.exe

  • Size

    21KB

  • MD5

    1d742e4cb4c40f4c615db13e9f9d324a

  • SHA1

    e507a373d92389af6908b3590dda8c06b951dfac

  • SHA256

    e4e90d2701acf5dc70247f2adea895e3fe52e2da5843a77899fb65d706078cec

  • SHA512

    41e7d7e4108a7616b2991efdcf86c9239a865da1823eebcac7506fe36c243e6baa56ca7d9778c71f2fcd6498f8919384faf1033eb8e7210a36503da55201a591

  • SSDEEP

    384:aFRdCybMqlWgmQ2Hd/RizVVGf7kINGUoVaCm3z9zlCtlR:kCyQqlhmQQOVGf7kI4ra3j95ib

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4e90d2701acf5dc70247f2adea895e3fe52e2da5843a77899fb65d706078cec.exe
    "C:\Users\Admin\AppData\Local\Temp\e4e90d2701acf5dc70247f2adea895e3fe52e2da5843a77899fb65d706078cec.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://dabao.dabao8.com/cf.aspx?68&weiwei775
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2028

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

          Filesize

          1KB

          MD5

          2c0f3dffa588855224bea03a8198fac6

          SHA1

          da54d9458cbc5a8d7078c9158b7f672c9e88a57a

          SHA256

          63340a6fc87e32b6d140418a8747d7490e33d37b888c521f3c2c2dfc47045f94

          SHA512

          9416739bb14911416d4f0ff14faaa4ee95f9a5742d6cca06e3410c304a3c31cbc5b6e400be571a016beb84fc16606459d97eee485c64016c5b1f0ed3e0ea68a3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

          Filesize

          279B

          MD5

          fa00575ec49589aae4ddb2642b992536

          SHA1

          ef6d93eedc5b6cc4319fc3c384157510da842fb8

          SHA256

          d46ce0629a882a365d271260d87a24981795a5cb3179db786d05b8399fa7dba0

          SHA512

          78b2698a14d96a48deee7eba525931f83565f21a8e8548d565b843e161e6d05f59c8b8e5165ca2bdce465906ff7647a311f90dbf79bde3dcac7a2fcf8902605f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

          Filesize

          438B

          MD5

          5acc1c76fd4a10f0ca64a1e31fba0bcc

          SHA1

          08b884c45214c79d55264db6713af818a7850028

          SHA256

          8fa0b97da6b7cd77fde949dbaf6a58a87f40101134639719d0cb31f61cba9511

          SHA512

          c66d171790c0b62b96455150d3a25a997552c01871aee1e6f5366547b375c4605b81c1674c44d4dbfba456f7db06107eac2fe8847ceb6be5eb5a4694030cdd5c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8c151344e78be9603af653e894a0dffa

          SHA1

          17f2b1b139087d71220669d58f2a2ebe91cc1c39

          SHA256

          5bb10ee62122a94bea68b83923dcd216cfdfb0ed93ba1cbb15576b552c3df401

          SHA512

          d8677075bd2565b50ab6a811b017bec241dda21bb0491369f28bead45d0c340ae18291e6877cfb40abf50580418a3432db16feeb98b75cbf80fe042c9f5a1b89

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273

          Filesize

          426B

          MD5

          e00722a06e0e5fba7400b7aa6e1cf0e4

          SHA1

          cc4c41ce1e8af445418fe8d6749c6f1291c934fb

          SHA256

          35b7c676a3eda1cf24f970344a3c23576081ad8665c1e938394cced236599fd8

          SHA512

          0da575783cf7befa3a9c8ff4337c2a4377acb11fc56063483f5886b8ff065d910e090706e53c0a3cf5f2fedab27de302f42f3aca1646f73ebe9a01e5f82a0c37

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

          Filesize

          1KB

          MD5

          294d6f71ee79dc153f3411a3a0b2ca0e

          SHA1

          e53ddd2182d61fe0d1190ede538ba96d37246d5b

          SHA256

          561b1c5a0e7d71600d40342d6922f8640d758e1a41a7868a6a39782fcbfe21f5

          SHA512

          007006ddeb3b9b3dd34781dff901e5997c0b342413fb2020ce8cfee535ad9f3adc76c20e704c478316c51b58fd39f447ae4135982763b2fd95b22efdbc3345e0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4P7G6G70.txt

          Filesize

          601B

          MD5

          b71ee463ce720452df64cb8244135c89

          SHA1

          e020cde269c6acdc810844ae13812d9e932d8c82

          SHA256

          de2203c02c02e39e6792249538e8691cf269cdd2974eeab459c1b7e1845c805c

          SHA512

          ce2cb1370dd73b6245a672b557a92bdeb23b832035625392d09d1bdad28c3599dccca59049595cd2246c4b13e8bdc63f188d4a5c3eb9326c8be4a9254e599e7c

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\90MOUM0X.txt

          Filesize

          177B

          MD5

          7cecc69bbec1bfc630218cef2fc2c373

          SHA1

          c99d43fa4ecc4b4e38d96a7f683fa2d114e22c04

          SHA256

          d8d80fbbe887d6757902b9406f1fc38d7ad19bb6d1aec524983424ba94bd7cd8

          SHA512

          e431cc0c9837d7ed65d1582529357cbd44c7df96d6dc94c4ffe71685a1045211a4a0379b70ba56f4d57bf519e7bb155ce2e303e02f52c37a4a9afaaddbb42d49

        • memory/1796-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

          Filesize

          8KB