Analysis

  • max time kernel
    205s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 15:48

General

  • Target

    f1e7ae7e61fb6b2d1fab04755289e9166eae5d1c65188a702885e729be4d4aa4.exe

  • Size

    354KB

  • MD5

    a1d9123381d9b48c371fd4c0130fd3ac

  • SHA1

    08fb9f8598c9042e9a6e57670cf3d1ca8dd48fdd

  • SHA256

    f1e7ae7e61fb6b2d1fab04755289e9166eae5d1c65188a702885e729be4d4aa4

  • SHA512

    bcd897d2da9f132e62a88c8c686e9cadb896f2b5d5a349266f3b936d57370ed39d9180ae3c69ed265f861764a647b3844c42f7412275bc219829d6b3e4f85525

  • SSDEEP

    6144:QLzaIMPUEt7yMQNwCFnbcUOtA1hPoEuDiO10Clm0YriLxGBNNgDGgDjaszuQ:0bExaJbcUOtA1hAEul10piLxGBNGDHD9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1e7ae7e61fb6b2d1fab04755289e9166eae5d1c65188a702885e729be4d4aa4.exe
    "C:\Users\Admin\AppData\Local\Temp\f1e7ae7e61fb6b2d1fab04755289e9166eae5d1c65188a702885e729be4d4aa4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\ProgramData\aEnFbPa06300\aEnFbPa06300.exe
      "C:\ProgramData\aEnFbPa06300\aEnFbPa06300.exe" "C:\Users\Admin\AppData\Local\Temp\f1e7ae7e61fb6b2d1fab04755289e9166eae5d1c65188a702885e729be4d4aa4.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\aEnFbPa06300\aEnFbPa06300.exe

    Filesize

    354KB

    MD5

    1e75f12f1940341d2d6fe947281db5dd

    SHA1

    1822b899656acc0f697cd066e5268ce1bf8792e7

    SHA256

    41a648bd065e76f457a8d19d1768492ea933da617d32de2a747c27df8953c481

    SHA512

    f73cc69ca164f0ddba28984eb9bec1787c903c0bce70ff9b28c57c036f7fdf890f1d6edb562886660d6c7260cd1ea32a21a49682d76bfd0947417904c08f52c8

  • C:\ProgramData\aEnFbPa06300\aEnFbPa06300.exe

    Filesize

    354KB

    MD5

    1e75f12f1940341d2d6fe947281db5dd

    SHA1

    1822b899656acc0f697cd066e5268ce1bf8792e7

    SHA256

    41a648bd065e76f457a8d19d1768492ea933da617d32de2a747c27df8953c481

    SHA512

    f73cc69ca164f0ddba28984eb9bec1787c903c0bce70ff9b28c57c036f7fdf890f1d6edb562886660d6c7260cd1ea32a21a49682d76bfd0947417904c08f52c8

  • \ProgramData\aEnFbPa06300\aEnFbPa06300.exe

    Filesize

    354KB

    MD5

    1e75f12f1940341d2d6fe947281db5dd

    SHA1

    1822b899656acc0f697cd066e5268ce1bf8792e7

    SHA256

    41a648bd065e76f457a8d19d1768492ea933da617d32de2a747c27df8953c481

    SHA512

    f73cc69ca164f0ddba28984eb9bec1787c903c0bce70ff9b28c57c036f7fdf890f1d6edb562886660d6c7260cd1ea32a21a49682d76bfd0947417904c08f52c8

  • \ProgramData\aEnFbPa06300\aEnFbPa06300.exe

    Filesize

    354KB

    MD5

    1e75f12f1940341d2d6fe947281db5dd

    SHA1

    1822b899656acc0f697cd066e5268ce1bf8792e7

    SHA256

    41a648bd065e76f457a8d19d1768492ea933da617d32de2a747c27df8953c481

    SHA512

    f73cc69ca164f0ddba28984eb9bec1787c903c0bce70ff9b28c57c036f7fdf890f1d6edb562886660d6c7260cd1ea32a21a49682d76bfd0947417904c08f52c8

  • memory/1344-63-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/1776-54-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/1776-55-0x0000000075C31000-0x0000000075C33000-memory.dmp

    Filesize

    8KB

  • memory/1776-62-0x0000000002340000-0x0000000002406000-memory.dmp

    Filesize

    792KB

  • memory/1776-64-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB