Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 08:58

General

  • Target

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8.exe

  • Size

    2.2MB

  • MD5

    41d2d84306230b4b34fd9bba81c8c266

  • SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

  • SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

  • SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8.exe
    "C:\Users\Admin\AppData\Local\Temp\2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8.exe
      "C:\Users\Admin\AppData\Local\Temp\2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8.exe"
      2⤵
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "Admin:(R,REA,RA,RD)"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:1904
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:648
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Roaming\Mxmetamux" /inheritance:e /deny "Admin:(R,REA,RA,RD)"
          4⤵
          • Modifies file permissions
          PID:1932
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {27DEB193-5500-4FB1-8F65-06B0795FA095} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
        "C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe"
        3⤵
        • Executes dropped EXE
        PID:1492
    • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
        "C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe"
        3⤵
        • Executes dropped EXE
        PID:636
    • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
        "C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe"
        3⤵
        • Executes dropped EXE
        PID:1632
    • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:388
      • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe
        "C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe"
        3⤵
        • Executes dropped EXE
        PID:1824

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • C:\Users\Admin\AppData\Roaming\Mxmetamux\libmfxsw32.exe

    Filesize

    2.2MB

    MD5

    41d2d84306230b4b34fd9bba81c8c266

    SHA1

    b50404acbac5c7d8315fecd477a1d43ddf6e812e

    SHA256

    2b9874c1a387cdd9bad50e5ecbb121bc5ac57afc1fcc5e830549641690f93aa8

    SHA512

    0431136940780b6e9e4565c39e78a66b9c3a677dbd8cb0aad2b29c995c11001916931d402c332d480d4806463fa51c3ae3478a17f7724c7663374455c9221bc8

  • memory/388-154-0x00000000005B0000-0x00000000005D4000-memory.dmp

    Filesize

    144KB

  • memory/636-129-0x0000000000190000-0x0000000000278000-memory.dmp

    Filesize

    928KB

  • memory/636-124-0x0000000000190000-0x0000000000278000-memory.dmp

    Filesize

    928KB

  • memory/676-133-0x00000000004C0000-0x00000000004D2000-memory.dmp

    Filesize

    72KB

  • memory/676-132-0x0000000000B70000-0x0000000000D8A000-memory.dmp

    Filesize

    2.1MB

  • memory/784-55-0x0000000000380000-0x00000000003A0000-memory.dmp

    Filesize

    128KB

  • memory/784-57-0x00000000004D0000-0x00000000004DC000-memory.dmp

    Filesize

    48KB

  • memory/784-56-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/784-58-0x0000000000550000-0x0000000000562000-memory.dmp

    Filesize

    72KB

  • memory/784-54-0x0000000000B70000-0x0000000000D8A000-memory.dmp

    Filesize

    2.1MB

  • memory/1184-85-0x0000000000560000-0x0000000000584000-memory.dmp

    Filesize

    144KB

  • memory/1184-87-0x00000000005A0000-0x00000000005B2000-memory.dmp

    Filesize

    72KB

  • memory/1492-116-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1492-115-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1628-84-0x0000000000B70000-0x0000000000D8A000-memory.dmp

    Filesize

    2.1MB

  • memory/1628-86-0x0000000000350000-0x0000000000374000-memory.dmp

    Filesize

    144KB

  • memory/1632-151-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-66-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-64-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-74-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-73-0x0000000075701000-0x0000000075703000-memory.dmp

    Filesize

    8KB

  • memory/1772-70-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-68-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-59-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-60-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-62-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/1772-75-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB