Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220901-es
  • resource tags

    arch:x64arch:x86image:win7-20220901-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    06-12-2022 17:16

General

  • Target

    d.exe

  • Size

    5.7MB

  • MD5

    2e1f790a8b5e337a4ca74a4ac9544479

  • SHA1

    a9331fde44b6c01e433ab443f8a9db9abedc35fe

  • SHA256

    046d57df77ce011ae117187aabbe1e7537602463a989dc045a0a8b2175bb6efa

  • SHA512

    e35ad0ea119d3e3e33a70750bb2034af52066cf6a99b9a160db9d6cff1fedde4356b50adce8382e4cef5d2225b52ed13feede61b085fede7bc4073ed385b96c6

  • SSDEEP

    98304:ruKjKZAG9TwZ6xvvV7D2eh3zcirjIPEgRSq2:abh3zi0

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d.exe
    "C:\Users\Admin\AppData\Local\Temp\d.exe"
    1⤵
    • Modifies system certificate store
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 url.dll,FileProtocolHandler https://wzeti.rdtk.io/638f63ddfd551e000148aaaf?sub1=e6c00f30-1e0f-4840-8884-8baf1242b25b&sub2=ended
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://wzeti.rdtk.io/638f63ddfd551e000148aaaf?sub1=e6c00f30-1e0f-4840-8884-8baf1242b25b&sub2=ended
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:328
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1236
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 url.dll,FileProtocolHandler https://wzeti.rdtk.io/638f63ddfd551e000148aaaf?sub1=e6c00f30-1e0f-4840-8884-8baf1242b25b&sub2=started
      2⤵
        PID:1820

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6a623800d9ca770083e22a850605aad0

      SHA1

      7d819f23aa99f5b5d3c9000509d4eab375a40c8d

      SHA256

      830c1e45f89bccb3884da0c1535572d493b31c3a6da404ba7631fa2c5c0a723a

      SHA512

      286e19b06f82ab7bfaf9f372ce54d662adac02ea06f489a0676a2e43ce219a6ae8f91956ac9d07dcfc5994f92a4dfcb13dd347b134ec01b7bf90ac375f6c72c2

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

      Filesize

      9KB

      MD5

      173c4d7d01f09acaadcf4a4fdc15bfc7

      SHA1

      0d5cc3b6b0cd8032e1fe169cf2a900d2dbe838b2

      SHA256

      fc8430b39da658227cd8e93b73601e7e5426fb5fee6f6beae057ebf239df4e86

      SHA512

      263171241b54f6e2b5103207c3cd92644e8a64db279e2bc0c74cd8675b598713fe9728725217ef90d32aab9f870cb9a63e13fc4de5bcfbc8c2748c4ee5923297

    • memory/1704-55-0x0000000076B51000-0x0000000076B53000-memory.dmp

      Filesize

      8KB