Analysis

  • max time kernel
    300s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    25-06-2021 09:58

General

  • Target

    lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
        "C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
          "C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
          3⤵
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:840
          • C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe
            "C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe
              "C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:764
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa38ead2b.bat"
            4⤵
            • Deletes itself
            PID:584
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1768
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1732
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1536
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:952
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1676
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1680
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:768
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                        1⤵
                          PID:556
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                          1⤵
                            PID:1168

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          2
                          T1112

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\tmpa38ead2b.bat
                            MD5

                            347db784a93ab1cd0951579a1cae24fd

                            SHA1

                            15a3bceef41dcb6113ff495ae634ffd0d1da775e

                            SHA256

                            5adbff3b3d9e8e6ded8f814ed5d37d3d9cb813def6e63295292c7c2273b1f8ae

                            SHA512

                            d7abd6a96cc0017cd8864156e6252e229352cc1fd1e7c01cd04115dfb91486f78b64b24e37e88cbfcfa16df978f52aba24d6c185266966f7f027cb95da354621

                          • C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe
                            MD5

                            bb1a9aa63cc1852695f505da38ba513c

                            SHA1

                            e28dba2e3c6b3a7472f599c41116a682b6166165

                            SHA256

                            e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619

                            SHA512

                            593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6

                          • C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe
                            MD5

                            bb1a9aa63cc1852695f505da38ba513c

                            SHA1

                            e28dba2e3c6b3a7472f599c41116a682b6166165

                            SHA256

                            e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619

                            SHA512

                            593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6

                          • C:\Users\Admin\AppData\Roaming\Zapate\atycd.exe
                            MD5

                            bb1a9aa63cc1852695f505da38ba513c

                            SHA1

                            e28dba2e3c6b3a7472f599c41116a682b6166165

                            SHA256

                            e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619

                            SHA512

                            593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6

                          • \Users\Admin\AppData\Roaming\Zapate\atycd.exe
                            MD5

                            bb1a9aa63cc1852695f505da38ba513c

                            SHA1

                            e28dba2e3c6b3a7472f599c41116a682b6166165

                            SHA256

                            e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619

                            SHA512

                            593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6

                          • \Users\Admin\AppData\Roaming\Zapate\atycd.exe
                            MD5

                            bb1a9aa63cc1852695f505da38ba513c

                            SHA1

                            e28dba2e3c6b3a7472f599c41116a682b6166165

                            SHA256

                            e696ac60f5059ab7edefec4bfd9c870804b0460de92ad8caaab2a00ecbc2e619

                            SHA512

                            593b520abc5a58912993b426fb2b9fffd39e1151a97971c079fe5ca5c6c007c7e0cfb566fbd0d15c4636af2a1ca18436d2137d201455abdee64b81d4fc471ab6

                          • memory/584-80-0x0000000000000000-mapping.dmp
                          • memory/764-77-0x000000000042B055-mapping.dmp
                          • memory/840-66-0x0000000000400000-0x000000000043B000-memory.dmp
                            Filesize

                            236KB

                          • memory/840-64-0x000000000042B055-mapping.dmp
                          • memory/840-63-0x0000000000400000-0x000000000043B000-memory.dmp
                            Filesize

                            236KB

                          • memory/840-83-0x0000000000440000-0x000000000048F000-memory.dmp
                            Filesize

                            316KB

                          • memory/840-84-0x00000000004C0000-0x00000000004C1000-memory.dmp
                            Filesize

                            4KB

                          • memory/1656-69-0x0000000000000000-mapping.dmp
                          • memory/1796-61-0x0000000000280000-0x00000000002A0000-memory.dmp
                            Filesize

                            128KB

                          • memory/1796-62-0x0000000076641000-0x0000000076643000-memory.dmp
                            Filesize

                            8KB