Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    08-08-2023 17:02

General

  • Target

    af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe

  • Size

    776KB

  • MD5

    170ede1de6420f4658be44999c50dd8a

  • SHA1

    0ca710b590bd70731bb133f2f617b92bcaeeac9d

  • SHA256

    af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c

  • SHA512

    e52bed65a5cffe461dedc7786d9f2c3c25e4a70df65b5cbaf017cd03fb5a8ecc7f9030efef86326b6b7734027d8126a28b4c2189df801637ee861cef55680014

  • SSDEEP

    12288:/0jYaiAP/J5sdS6wkq8O+595AU4iDetY0J4+1WNxinSj+BRs1Es58iJ64N2h+j9b:/0jxiYsWkZLD5AUTetW+IakFj64tZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe
    "C:\Users\Admin\AppData\Local\Temp\af4ba032206e9b05ebc4cf0b53493473c59dae672d46f5a2791bfa1e93af713c.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\FZGZXD4Y\d8.sina.com[1].xml

    Filesize

    95B

    MD5

    8a0d8a4a66482093f36540d95632fea4

    SHA1

    fa64398e84cab9c54395d6aca7ae8db0eb63d293

    SHA256

    45dd8c60c9eb1100da4db19bdcf79687a5f7e0693f160e0264a2c3b6a139c498

    SHA512

    266494cebba3e6d9b6574d5bc626f70e0cecd88dd55616081106cb631a11899ae6ce4d426e93ac1ee47d61da2743a6b7e9e12b5a6dc864cdf07deb6ad4ea74bb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\GJ97UASG\news.sina.com[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    106B

    MD5

    719376da11885c80758bbcb288b11495

    SHA1

    f80146accd40a18c3b539002a2a161c589be4783

    SHA256

    d0fb53249a08b47a806db7ee85546bfe4be01e01058b0bead9298cc334242e09

    SHA512

    3c1d7054176051919f4a54856c977a75edb68eb7984fff0b61748276705c1fe732cc52c4b61c8ac2b411ded63fcfa7494dbc799c5856cbfe188b5cbcfb7676a6

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    51B

    MD5

    2fe6a9ac8d1b8aa4868ecb32e5967664

    SHA1

    e014dc4278458812fac60ba5cea88a1647a0bca8

    SHA256

    f9b9c509d895420f3e54aa226a4eea13bc4f7275860228e837bb8e954c3db88a

    SHA512

    8513eb6e149241fa9434785994a20973ca1d1c049d33c0b4c78ede6b5518e3a1efaf14f55d4ade8847a30067c2cd4a1a657638d7aa4f2cb36ae35b33c595379d

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    51B

    MD5

    7f3caf47dde94a9684497dfe2aaad46d

    SHA1

    3ad5bc979213d4f95a5585d73f9786f3e9730242

    SHA256

    afcaa0eb594a76bcae5ef45151156d71ff070c198f372f09c3cacc4caffc1d21

    SHA512

    a5a40534a9ca46ae6c9bc5dda1574f6166cce8228ecb88802f91c1105bbde2c7546edf492deff4d3a3836adb5584a2e2f51accdcdd5eea476db3c87ba3d64e7e

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    84B

    MD5

    ed87ed2d66dbbb49f9510dccbefb8e87

    SHA1

    a839b0e28830da2fa1119d6027a1d837c2218566

    SHA256

    cc29c6cac1d821b475723c0f2e625c9b414ceeea49f8c669c380000e73773846

    SHA512

    15d61774597e9a28250bfbcade0fc207019c133284481f44c954203bdbfc918a5fde2e9780be956da1242a64b63257851de75538a2c544461bbad31a839cf902

  • memory/2432-237-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-252-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-95-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-87-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-214-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-220-0x0000000006350000-0x0000000006370000-memory.dmp

    Filesize

    128KB

  • memory/2432-75-0x0000000003A80000-0x0000000003A90000-memory.dmp

    Filesize

    64KB

  • memory/2432-239-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-54-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-126-0x0000000006350000-0x0000000006370000-memory.dmp

    Filesize

    128KB

  • memory/2432-253-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-255-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-256-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-257-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-258-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-259-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-260-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-261-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2432-262-0x0000000000400000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB