Analysis

  • max time kernel
    120s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 02:57

General

  • Target

    283ce39ad8ec52423b126cc57135cbba799eccc85c79aaca9994a3bae32f75f3.exe

  • Size

    3.4MB

  • MD5

    69fc66f5aa6b0f56c07d414bb49edc40

  • SHA1

    156433be57ca8563751ea3b4c09b25ab5a7f2657

  • SHA256

    283ce39ad8ec52423b126cc57135cbba799eccc85c79aaca9994a3bae32f75f3

  • SHA512

    09227be6ff89a8a07c44a5f9bd3d090cec0fb8c04e43900049860f58d559351380fbce2ae356121c00cbb4e51a1f51137eb6b555b56bfa1ee5fb3e45f1d72e93

  • SSDEEP

    49152:2pN2uvE9FCoo1IP9wuKxpIoCh8jK8/8y80Nl2cSIk/gdp9HeT0/:O2TooOQGusIoCIRNlrSIk/mp8T0/

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\283ce39ad8ec52423b126cc57135cbba799eccc85c79aaca9994a3bae32f75f3.exe
    "C:\Users\Admin\AppData\Local\Temp\283ce39ad8ec52423b126cc57135cbba799eccc85c79aaca9994a3bae32f75f3.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ver
      2⤵
        PID:2292

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\HOTPE.INI

            Filesize

            1024B

            MD5

            a43caf4fa7fcf7f0b63a4907d5ed926f

            SHA1

            901c177eca20b666d94699613654945c47be8eb7

            SHA256

            23e73d741818034c08fd2d26d994516491cbfbb9d1d9e1d5c1a31b6113c591d4

            SHA512

            d2f312a20826bbceabc6bf1b38429c4ef3ee5133ed42ee3522712550d9e95d63173de2b107655458d88e95b977930b683922ecc6cc9d414cde50c5112d382f52

          • memory/3068-0-0x0000000000400000-0x00000000006FC200-memory.dmp

            Filesize

            3.0MB

          • memory/3068-16-0x0000000000400000-0x00000000006FC200-memory.dmp

            Filesize

            3.0MB