Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 03:28

General

  • Target

    0cf583094abd67ccf79b3b40f3bccf7d.exe

  • Size

    6KB

  • MD5

    0cf583094abd67ccf79b3b40f3bccf7d

  • SHA1

    aa15e5c6a0d95b62a6fb54500e65f93c5eb07ec0

  • SHA256

    bb52aefe22d08e53e09c85662c3596176ba757f9c213460b03b45de56f635400

  • SHA512

    3dd236aa0cc4b6a75d07a444813dae1828dbbf4bf817ba2f4d81655ca2ca54dc78b38849a0ff24e168f3e6995c8d0b74c5e393ffcad30a6c700a0a8d0c80dddc

  • SSDEEP

    96:liERfPyJ+u4GbCuHxxTiEYS+gkAsUCCXlz26iyd6c/aV0jX:AERnvGOuHzKKL9CCXlS6tB/aV0jX

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2704
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
  • C:\Users\Admin\AppData\Local\Temp\0cf583094abd67ccf79b3b40f3bccf7d.exe
    "C:\Users\Admin\AppData\Local\Temp\0cf583094abd67ccf79b3b40f3bccf7d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2316-0-0x0000000013140000-0x0000000013150000-memory.dmp

    Filesize

    64KB

  • memory/2316-2-0x0000000013140000-0x0000000013150000-memory.dmp

    Filesize

    64KB