Analysis

  • max time kernel
    123s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 06:50

General

  • Target

    d7b5c6f3ed105a59dc46e0609a63822fe7a0acb7f89b23feba5f0887bfb55483.exe

  • Size

    236KB

  • MD5

    2724c4683ee6316b1f0b84bea6365dc8

  • SHA1

    e45f0d527c1b42e111371227e36c7e5ab6652d97

  • SHA256

    d7b5c6f3ed105a59dc46e0609a63822fe7a0acb7f89b23feba5f0887bfb55483

  • SHA512

    276fb7c056bb79b889e749c95e36016b485e6d6a5679ea8e9fa59e6f7e58f9626e95b776f4dc763814e67fb9feae0f55dfeaabb9b694ba339551fd79aa842c64

  • SSDEEP

    3072:z0m8qv7NiJPupzueUFAw4gPrNfOOO7ezCYnRjatK1YCqGRF6P2dNS1zjAL:Ym8q66gPrpGezC0atK1YCqGWz1P

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 63 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7b5c6f3ed105a59dc46e0609a63822fe7a0acb7f89b23feba5f0887bfb55483.exe
    "C:\Users\Admin\AppData\Local\Temp\d7b5c6f3ed105a59dc46e0609a63822fe7a0acb7f89b23feba5f0887bfb55483.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.chaoskoxp.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    228d25dd7d377af29848012a2b059814

    SHA1

    a29a3c1e167f3581b0aa4be90b1769a89beab01c

    SHA256

    9d4e26398806093c8af5a60e646afb3c2fc110ea0dc93821e29dc48da62280bb

    SHA512

    1d004bb21f7225fe220aae71d7836c0f5b2e58cb855209e2cc7f1a903ae73b67c408f59108b31faf7caed420758f4753b476c927299da5d607304b5d3a45bc61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    c4e60e344e3797b916775083b3dcf944

    SHA1

    8ccd543a776fd3a54d57f2c8472cd9a1fb4a52af

    SHA256

    de8a2f948f09ccc32adf221ef8d9812da71bf04867fe1da75399a12dae70d8a2

    SHA512

    e27e9e1bceb923e32448ee678a15d3b4d284c83d6e2545bd93c59c86f8a9b9c9fdb86cfad9b64a87e80b2b29f9fcc486b5a2d15e74134b856a42871b6cceea26

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ru1r3yf\imagestore.dat

    Filesize

    1KB

    MD5

    498d4d739cf316fefd75d73f38e11491

    SHA1

    b262536f0334c0825763624ba4740dcdd8696aa8

    SHA256

    a6af2c1586d97a0bc9b4327b55f2c7701703b1ca2d558d1374e45df898c37d5b

    SHA512

    ce53ed87007b9cc5f134d268cd12bee0a2e2a75cd107c652e693352740a202e4a7af9980d8aeed5b60af5cb4f500d844df11055c567cd7c72b6ccc3669a28883