Analysis

  • max time kernel
    300s
  • max time network
    258s
  • platform
    windows10_x64
  • resource
    win10-de-20211014
  • submitted
    21-10-2021 12:43

General

  • Target

    OQfFxsl.exe

  • Size

    1.6MB

  • MD5

    44150395748c027ef5f8eed812f620b0

  • SHA1

    0d26c44e5e93a08da7504344498d3275ca11653e

  • SHA256

    144525451ace8e714f95f6235f310b6959871e559e11f33f3164006a02832a7f

  • SHA512

    5ba96935ebacd7c4e377c3171d411e7383132eed1c087ef66c3fe1a54987f826ac9221a1f43f4cc6627d184f7621dca6858b84ae692bde127bdf9d3a7bc04a4c

Score
10/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Executes dropped EXE 3 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Modifies registry class 44 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OQfFxsl.exe
    "C:\Users\Admin\AppData\Local\Temp\OQfFxsl.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      2⤵
        PID:1684
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Starne.mid
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:816
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^kXhUbWhdyiSzQwKWBBZJjppRDRvuTjJfOgrsoBnWshULiZzcvfBNflRwOcsFmuvSnDFCYzOqeeaZfbKDnwKEL$" Sorte.mid
            4⤵
              PID:432
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
              Nascondere.exe.com W
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1604
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com W
                5⤵
                • Executes dropped EXE
                • Drops startup file
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1888
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1360
            • C:\Windows\SysWOW64\PING.EXE
              ping localhost
              4⤵
              • Runs ping.exe
              PID:808
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe
        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.196.0921.0007\FileSyncConfig.exe"
        1⤵
        • Modifies registry class
        PID:404
      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe
        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe" /frequentupdate SCHEDULEDTASK displaylevel=False
        1⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:3428

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ambo.mid
        MD5

        e44fd575c6528190adc21c41297c7f0f

        SHA1

        4a834789bb3ddeea37cd30861a4c0bb639eeafed

        SHA256

        9ae0b37e4b26a6684eed731f3c3958e3661a3da9a89759825b97efebfe183547

        SHA512

        443f8aff20c51f236b16eba5dbe3890d157f85909ab36b1d084142836a343e6acb97e752d18819bec62e1458a038d9b24c609602dc3cbef87d959e597e0af19f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ami.mid
        MD5

        c2a501f010bf7b1c7a9777c3b93e19ef

        SHA1

        d00adfeb88b435786f32cf7f45c1aae141690600

        SHA256

        312d9b0380e5d8fd0bbee92b5d7f22a09b9278cbd7457777a08e2df5a859aff9

        SHA512

        2850ad61312adc4d059e62c7dfaebabaa74ac280773e24920b746a56884d8c490b1d5c6637d56c966ca284a9cd515330d38faff55cfe77a1bd11f54f2c82f6fd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nascondere.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegAsm.exe
        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorte.mid
        MD5

        ca6c6b8893411108280a0daf1a4d7d61

        SHA1

        b791c3cdec5711baafa7be643d2d9a0a10ae0835

        SHA256

        61b5e21e9798a8bf59a1c2e284d78d86706b4dc9bd6bef46bce54af95886bb46

        SHA512

        c0f8c6e6c08a96d6bc9b77af1f300d45b011faa606c85b6220b89d890692d200230c16a206fa6c94a5f9e1568eb10181199a0d6b80b94f80706a5cd00f4fdbcf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Starne.mid
        MD5

        603011f56db8309b2d5c4ea0a1c57a47

        SHA1

        91ffdd8dbc6c5935c954f2764bec480ae32a1432

        SHA256

        5e4c34d70260f9bc2ce9f44b8fdef503667493f8d7c9d13b659da3b270a053f0

        SHA512

        b1d53112fb89fc755e3933e88bcabd1ce2a2aa0032c948530769d96d06ca066d106fcdf2127348e618c7aac8b24b21ddbbdbdfd5113a641dbcd2da217d9ebdbe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W
        MD5

        e44fd575c6528190adc21c41297c7f0f

        SHA1

        4a834789bb3ddeea37cd30861a4c0bb639eeafed

        SHA256

        9ae0b37e4b26a6684eed731f3c3958e3661a3da9a89759825b97efebfe183547

        SHA512

        443f8aff20c51f236b16eba5dbe3890d157f85909ab36b1d084142836a343e6acb97e752d18819bec62e1458a038d9b24c609602dc3cbef87d959e597e0af19f

      • memory/432-119-0x0000000000000000-mapping.dmp
      • memory/808-124-0x0000000000000000-mapping.dmp
      • memory/816-118-0x0000000000000000-mapping.dmp
      • memory/1360-139-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
        Filesize

        4KB

      • memory/1360-141-0x0000000004ED0000-0x00000000053CE000-memory.dmp
        Filesize

        5.0MB

      • memory/1360-146-0x0000000005C80000-0x0000000005C81000-memory.dmp
        Filesize

        4KB

      • memory/1360-131-0x0000000000900000-0x00000000009B2000-memory.dmp
        Filesize

        712KB

      • memory/1360-145-0x0000000005FB0000-0x0000000005FB1000-memory.dmp
        Filesize

        4KB

      • memory/1360-144-0x0000000005C50000-0x0000000005C51000-memory.dmp
        Filesize

        4KB

      • memory/1360-137-0x00000000053D0000-0x00000000053D1000-memory.dmp
        Filesize

        4KB

      • memory/1360-138-0x0000000004E10000-0x0000000004E11000-memory.dmp
        Filesize

        4KB

      • memory/1360-143-0x0000000005B90000-0x0000000005B91000-memory.dmp
        Filesize

        4KB

      • memory/1360-140-0x0000000004F40000-0x0000000004F41000-memory.dmp
        Filesize

        4KB

      • memory/1360-142-0x0000000005CA0000-0x0000000005CA1000-memory.dmp
        Filesize

        4KB

      • memory/1432-116-0x0000000000000000-mapping.dmp
      • memory/1604-122-0x0000000000000000-mapping.dmp
      • memory/1684-115-0x0000000000000000-mapping.dmp
      • memory/1888-126-0x0000000000000000-mapping.dmp
      • memory/1888-130-0x00000000014A0000-0x00000000014A1000-memory.dmp
        Filesize

        4KB