Resubmissions

22/02/2024, 18:35

240222-w8j32aeb82 3

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 18:35

General

  • Target

    WeMod-Setup.exe

  • Size

    141KB

  • MD5

    b7a8c7f363ac58aa95c8c2090e1b87a7

  • SHA1

    10f01392b18643b522a07750f23b4b3a1fae8225

  • SHA256

    cf050a532236fb9762be5db9a81414d6e1befebc0e6a0cb80778cb295acb86bb

  • SHA512

    9409ed3cca63deb5fb5513bad4e86e23adbe47e2ea890dc322fe4a7e90b29bbfe343361f21530748d5ba3c329e93684bf7b136a8c00f41cf08ef5c0025a9cd56

  • SSDEEP

    3072:Bojm4ILlCI+4COHCyhaEtHZkOpk97oc4ILlCI+4TOHHSafx:Bd+bwaEtHLhiHt

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\WeMod-Setup.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2340

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab4720.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar4771.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • memory/2340-0-0x0000000001300000-0x0000000001326000-memory.dmp

          Filesize

          152KB

        • memory/2340-1-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

          Filesize

          9.9MB

        • memory/2340-2-0x000000001AA70000-0x000000001AAF0000-memory.dmp

          Filesize

          512KB

        • memory/2340-3-0x000000001AA70000-0x000000001AAF0000-memory.dmp

          Filesize

          512KB

        • memory/2340-4-0x000000001AA70000-0x000000001AAF0000-memory.dmp

          Filesize

          512KB

        • memory/2340-80-0x00000000220F0000-0x0000000022896000-memory.dmp

          Filesize

          7.6MB

        • memory/2340-135-0x000007FFFFEB0000-0x000007FFFFEC0000-memory.dmp

          Filesize

          64KB

        • memory/2340-148-0x000007FEF5870000-0x000007FEF625C000-memory.dmp

          Filesize

          9.9MB

        • memory/2340-149-0x000000001AA70000-0x000000001AAF0000-memory.dmp

          Filesize

          512KB