Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2023 17:59

General

  • Target

    tmp.exe

  • Size

    4.8MB

  • MD5

    a10fa64c05f5bb526dcba64d60064e84

  • SHA1

    e6ce00e73374b8c78f503c2742815eba291a582f

  • SHA256

    51e1160e95ce7fc7bb0aadf3d2df15f63f0eda6a4f4f9dcbcac2fa2c274c6ee4

  • SHA512

    a918e3a217b6373cb5dae0228c032011bf319b62386a5b221ffdf2d36091ebe2259c19a7fd7a18bd8cc34a10542a9358e65aa90181fbbac2d8893372272656b5

  • SSDEEP

    98304:GDHZC4mTh4lw9vzSywti+JGv2BZSPyJD6ZXKwi1jDQXO0qgaaDAAnyuDbo9:Ww9zSFbBZSPyF6VKrgpnywbO

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3HUPY26S\jquery[1].js

    Filesize

    94KB

    MD5

    cd4ea5f4b5e0bf6fcdd35af27712337f

    SHA1

    4d29aaef388b89fec4de6985e1467eefb3ed64a3

    SHA256

    534d48d4b317618768d7ec76b746b924ff14aa0e6584c43209639a00200a46f7

    SHA512

    6af5330ed54973796c238a23e4f5bd8425d2849d400e5d4e052b83815aa28b7a6f9546714acb1c8e1660acee67f7d5bf08f82606a3450a4af5954dcaac0cdd3a

  • memory/2644-160-0x0000000008FE0000-0x0000000008FEA000-memory.dmp

    Filesize

    40KB

  • memory/2644-161-0x0000000070F50000-0x0000000071262000-memory.dmp

    Filesize

    3.1MB

  • memory/2644-162-0x0000000008FE0000-0x0000000008FEA000-memory.dmp

    Filesize

    40KB

  • memory/2644-163-0x0000000070F50000-0x0000000071262000-memory.dmp

    Filesize

    3.1MB