Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 20:43

General

  • Target

    a60d8d86144407953b90ff2abe408241dd2ccbc5ff7a34755df11ffc2776b7a3.exe

  • Size

    1.7MB

  • MD5

    3e99a133a0f3ee785923b79b6cdd17d1

  • SHA1

    dea88bd64d1c585a80f863250c00821f39a4014c

  • SHA256

    a60d8d86144407953b90ff2abe408241dd2ccbc5ff7a34755df11ffc2776b7a3

  • SHA512

    69e4b44288096c27f9d75c4446d605c4e76071640a190d6de74fdce0994dd535fb4835a517a4b6ef929333e92f482257edd7b9bb764c80d5315437d5463ce49b

  • SSDEEP

    49152:1MwZFptYkAmDRMwlOJL67y/LZO9nmVc+ZhXZ:1MwZlNdDd8DZGyc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a60d8d86144407953b90ff2abe408241dd2ccbc5ff7a34755df11ffc2776b7a3.exe
    "C:\Users\Admin\AppData\Local\Temp\a60d8d86144407953b90ff2abe408241dd2ccbc5ff7a34755df11ffc2776b7a3.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2192-0-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-1-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-2-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-3-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-61-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-62-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-63-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-64-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-65-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-66-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-68-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-69-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-70-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-71-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-72-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-73-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-74-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-75-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB

        • memory/2192-76-0x0000000000400000-0x0000000000876000-memory.dmp

          Filesize

          4.5MB