Analysis

  • max time kernel
    105s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2023 02:33

General

  • Target

    Hola-Browser-Setup-Inst-Agreed-C-Mmtdb2.exe

  • Size

    1.4MB

  • MD5

    0ae910eee527d508745f79d10762fdfb

  • SHA1

    e40557b1cbf21942c45c0462e1b24a1a83ef9e99

  • SHA256

    2b8235f92ed8e96ccd83e8a47428642f4d0599df496dc7c2d75772c3cc9d54cc

  • SHA512

    7ca24844010d5be334d78dbb808b60785a1b4e507425e94c840d4bdd30f2aea8a4821e309c9ed673291d952cfae29868e73b9adc5ad436a39691720fc8b71afa

  • SSDEEP

    24576:2nlwinUv+L8m657w6ZBLmkitKqBCjC0PDgM5A4woGHp:2nlyuVV1BCjBkJ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hola-Browser-Setup-Inst-Agreed-C-Mmtdb2.exe
    "C:\Users\Admin\AppData\Local\Temp\Hola-Browser-Setup-Inst-Agreed-C-Mmtdb2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1248
      2⤵
      • Program crash
      PID:1440
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:544
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:884
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1864
      • C:\Windows\System32\control.exe
        "C:\Windows\System32\control.exe" SYSTEM
        1⤵
          PID:2036
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
          1⤵
            PID:1940

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/884-56-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/884-57-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1924-54-0x0000000000B70000-0x0000000000CD8000-memory.dmp

            Filesize

            1.4MB

          • memory/1924-55-0x0000000004E40000-0x0000000004E80000-memory.dmp

            Filesize

            256KB