Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 20:13

General

  • Target

    ImpactInstaller-0.9.5(1).exe

  • Size

    2.4MB

  • MD5

    27b58daaf8c2aca30c626567eed63bda

  • SHA1

    abb4ffea413e5caf62ed34d9e4301e49a38be3db

  • SHA256

    341f9e812e73392f2a64a1978c785f8d928cf7f8c0acdae77b1c180936ec596c

  • SHA512

    ddb7ee2f76711697b00f230a54b0466758ae7e13b2bedf3319caa8a50e85b3099223d0f1e022c999316d1468ba94200d71c765bcd1e352c02e0bd5ce25237ab2

  • SSDEEP

    49152:/t7ZxrWpynDGoMhG+4CgPHJaOHKh5Va1lPBTpWEVf+:/t7ZxrWgDGoq4Bf0OHKh5M1Npptc

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ImpactInstaller-0.9.5(1).exe
    "C:\Users\Admin\AppData\Local\Temp\ImpactInstaller-0.9.5(1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\f9yyw0t\imagestore.dat

          Filesize

          1KB

          MD5

          96579d7436453583ea395e017d2c0909

          SHA1

          e2f2ebd301f29e59e8bde48f253f6ff082ec0955

          SHA256

          b2e8c118dc8897366a25b7d3d9267eebc44799c95deff1abcb290270b8ec2cef

          SHA512

          5cf1bddcfdc67e01eab6bec1d4d0b5177931d852205e95f94c6eb07384bc8a7ac7cbe57797e43bb22cabe2c7dd1ee978595d8c302de23fdd92f1bb8eaa4097d6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U1J1BPYJ\favicon[1].ico

          Filesize

          1KB

          MD5

          8e39f067cc4f41898ef342843171d58a

          SHA1

          ab19e81ce8ccb35b81bf2600d85c659e78e5c880

          SHA256

          872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd

          SHA512

          47cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890

        • C:\Users\Admin\AppData\Local\Temp\~DFC775055191E0AA08.TMP

          Filesize

          16KB

          MD5

          5347f2886dd9aac5ca020f6ac73a944d

          SHA1

          8c4d15d98a133ea536af404e88ab28f29ebe3a37

          SHA256

          23f74bdc17e52ed994334e1bb4fc702229af79363ee77c305f455f638a40e384

          SHA512

          2beccaf2a6d164389c8c718ad4bb5b135259dbe6e8b28892317a6e9f22b573132ad8655a149c69032bb3cb74cdb81326de9ecaf1a85388f3f830635d8ffcc30d

        • memory/1680-0-0x0000000000400000-0x0000000000452000-memory.dmp

          Filesize

          328KB