Analysis

  • max time kernel
    99s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 18:22

General

  • Target

    99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe

  • Size

    5.3MB

  • MD5

    3e4e6091833b5b343142199f591d9fc2

  • SHA1

    c8da3112aec96c69874b08a34e9adb7245babde3

  • SHA256

    99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7

  • SHA512

    0f8c4c1aa612c0fc00c3383017a41b013f7ab483a685c1d2c0ad48d28da7274c5532915d6a7c34dc7a22fcde26aa4825d8dae5c0e010e29d99362858a172926c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Windows Firewall 1 TTPs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe
    "C:\Users\Admin\AppData\Local\Temp\99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe"
    1⤵
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo [Temp] >%windir%\ScriptTemp.ini
      2⤵
        PID:1848
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c echo Temp=_temp05212022386408 >>%windir%\ScriptTemp.ini
        2⤵
          PID:1168
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c set "Path=%SystemRoot%;%SystemRoot%\system32;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;" & netsh advfirewall firewall delete rule name="HEU_KMS_Activator"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall delete rule name="HEU_KMS_Activator"
            3⤵
              PID:1816
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c set "Path=%SystemRoot%;%SystemRoot%\system32;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;" & netsh advfirewall firewall add rule name="HEU_KMS_Activator" dir=in action=allow profile=any program="C:\Users\Admin\AppData\Local\Temp\99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3572
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="HEU_KMS_Activator" dir=in action=allow profile=any program="C:\Users\Admin\AppData\Local\Temp\99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe"
              3⤵
                PID:3872
            • C:\Windows\_temp05212022386408\7Z.EXE
              C:\Windows\_temp05212022386408\7Z.EXE x C:\Windows\_temp05212022386408\KMSmini.7z -y -oC:\Windows\_temp05212022386408
              2⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:4628
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c set "Path=%SystemRoot%;%SystemRoot%\system32;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;" & echo [Direction] >%windir%\_temp05212022386408\ScriptDir.ini
              2⤵
                PID:4252
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c set "Path=%SystemRoot%;%SystemRoot%\system32;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;" & echo Dir=C:\Users\Admin\AppData\Local\Temp >>%windir%\_temp05212022386408\ScriptDir.ini
                2⤵
                  PID:4920
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c set "Path=%SystemRoot%;%SystemRoot%\system32;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;" & echo Name=99f37be737f2a1d0cfe958cc65fde94c310689d59304845c6e9a882bb75c08a7.exe >>%windir%\_temp05212022386408\ScriptDir.ini
                  2⤵
                    PID:1164
                  • C:\Windows\_temp05212022386408\kms_x64.exe
                    C:\Windows\_temp05212022386408\kms_x64.exe
                    2⤵
                    • Executes dropped EXE
                    • NTFS ADS
                    • Suspicious behavior: GetForegroundWindowSpam
                    PID:1752

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Modify Existing Service

                1
                T1031

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\ScriptTemp.ini
                  Filesize

                  36B

                  MD5

                  b7ad63dee38fb57371877489d3f13bdd

                  SHA1

                  7894aa35375d8578cec6f16831cfc9328cf56940

                  SHA256

                  4f0a69bd81f14d0816d2e4a09bf7aa254afc6cd99ff08b7fd0ab53a4174b662d

                  SHA512

                  e38a69fc99e549df4f37c8fd96e35232fabd2bb794e3b37b5af1c1d3f86db3fb93d8697ee8dd93296bfb15fa87257bb0840aa8a88db87ce6c2b9edb731835bfe

                • C:\Windows\ScriptTemp.ini
                  Filesize

                  36B

                  MD5

                  b7ad63dee38fb57371877489d3f13bdd

                  SHA1

                  7894aa35375d8578cec6f16831cfc9328cf56940

                  SHA256

                  4f0a69bd81f14d0816d2e4a09bf7aa254afc6cd99ff08b7fd0ab53a4174b662d

                  SHA512

                  e38a69fc99e549df4f37c8fd96e35232fabd2bb794e3b37b5af1c1d3f86db3fb93d8697ee8dd93296bfb15fa87257bb0840aa8a88db87ce6c2b9edb731835bfe

                • C:\Windows\_temp05212022386408\7Z.EXE
                  Filesize

                  574KB

                  MD5

                  42badc1d2f03a8b1e4875740d3d49336

                  SHA1

                  cee178da1fb05f99af7a3547093122893bd1eb46

                  SHA256

                  c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

                  SHA512

                  6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

                • C:\Windows\_temp05212022386408\7Z.EXE
                  Filesize

                  574KB

                  MD5

                  42badc1d2f03a8b1e4875740d3d49336

                  SHA1

                  cee178da1fb05f99af7a3547093122893bd1eb46

                  SHA256

                  c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

                  SHA512

                  6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

                • C:\Windows\_temp05212022386408\KMSmini.7z
                  Filesize

                  2.2MB

                  MD5

                  19d6252765eb66809bec9ac0ba8b02e8

                  SHA1

                  7070e76e18532f7b78678d7e606906b683e83c87

                  SHA256

                  f3b4e65e959b0a7e7f9cb926740699d74fcc07bcfdf9667526d2bd3a3d9d08f8

                  SHA512

                  6ca5a4c99c51a8633b23e24702cf727a4dcf36fa2b4dccac39e9da42648aa43820e307c818b2aaf81aa7a4a0cd00b588463d0359798f9b176fd8389ba7568734

                • C:\Windows\_temp05212022386408\ScriptDir.ini
                  Filesize

                  14B

                  MD5

                  a3bb1797b76a2674a814a04172b6e63c

                  SHA1

                  977475470985b9feb3774d669629fee6349e421d

                  SHA256

                  1f37f1842e579e5a6d5e6c515c5e350d3e23a5dea0fc737556f9bc4c3bc52ac8

                  SHA512

                  b6bd395fde38a5bf5d08737b06b6726225b6cd7370f7e04dd1912f61c43add062f7f991503f77022d2bd945bdedfc67b13c5f8e839598534ae275980c7e50cff

                • C:\Windows\_temp05212022386408\ScriptDir.ini
                  Filesize

                  130B

                  MD5

                  460acd8037387e23306d3673693f9a58

                  SHA1

                  849809aa178b10c39cd324e2bfa7c4abc5f5ecea

                  SHA256

                  5fbe685e0f41b00aaff0ea289efe560b15acccb8507e8c63111cab3ee695cd72

                  SHA512

                  7ca9e5197e96ba843bb503cb1e97e173bc3f4a7452fbbe904e33c7f72456bdda6626d63b546b0582c4a6a4aa7d8b5432a4db52e46400e8bc8d8cd6be685bc7e5

                • C:\Windows\_temp05212022386408\kms_x64.exe
                  Filesize

                  1.1MB

                  MD5

                  3cff65359b6bb21bdcf3195a88784f37

                  SHA1

                  c76a4b003bb9a39425c031512e5de845353264c4

                  SHA256

                  ee58b25b152479356ab5d6575aae2c755df9ea339731558fa16582900708b3fc

                  SHA512

                  27febd02d700a4072fb2190070366d5fc006683819fbf4ebf77948a167d7735cabf020bf8a309a7e579e4c0993794d7785bfacab32febf56307f5a709dd06863

                • C:\Windows\_temp05212022386408\kms_x64.exe
                  Filesize

                  1.1MB

                  MD5

                  3cff65359b6bb21bdcf3195a88784f37

                  SHA1

                  c76a4b003bb9a39425c031512e5de845353264c4

                  SHA256

                  ee58b25b152479356ab5d6575aae2c755df9ea339731558fa16582900708b3fc

                  SHA512

                  27febd02d700a4072fb2190070366d5fc006683819fbf4ebf77948a167d7735cabf020bf8a309a7e579e4c0993794d7785bfacab32febf56307f5a709dd06863

                • C:\Windows\_temp05212022386408\pic\ewm_wx.jpg
                  Filesize

                  32KB

                  MD5

                  362e94b6ad5ac32ced1e9c84b7409506

                  SHA1

                  094584059b3e3462da4298b651a92d1fd0691325

                  SHA256

                  1f81e6d61080adbbacb425c21bc9fc8eb33269da462cbf00fbf6be3bdb14c308

                  SHA512

                  672a21ffbdc578e820e307acef68bd1cb0a252adc3e2dd6f097fb6320bb313f89711e71c232589b78bb856323e062424a73edfd5720a68e4d7b67c044cc7fdab

                • C:\Windows\_temp05212022386408\pic\ewm_zfb.jpg
                  Filesize

                  33KB

                  MD5

                  d3a12977fffc2002685151f0af5143ea

                  SHA1

                  ac3c887bee44748fa9192aaa32606ea768b9e459

                  SHA256

                  f046f91eac3dbe86d9e2dcc11281ca855a96f15a8f8ed62f0216f3076826fa35

                  SHA512

                  4247aee80b6f55466d4ba2fc6b3d9ba76575cbdbc74b96cb810768d396c1e7469cbcc2d81cd4f7c79a39bf1a69ad3fd14a97e97156d6ff2ef43e4c56be5885d0

                • C:\Windows\_temp05212022386408\pic\head.jpg
                  Filesize

                  28KB

                  MD5

                  069d803d68fa5bb3bade568a8f6bc1ce

                  SHA1

                  dbb7b41831d705b762a2b87a6f8e7cb4ee6fc9e5

                  SHA256

                  9c047b20f9baa9fdeadd70d93cce5fc5f31d1c4f446cb2d9acc523209e6c75e3

                  SHA512

                  abeb1e94bc63fdc5496b354b8788cdb249e92b0fe0829f8a0052f5b8d4f09309b62dbc85f2fe1370c527f97f9e45ac0aabde44bedf9175792db90131432be885

                • C:\Windows\_temp05212022386408\pic\left.jpg
                  Filesize

                  17KB

                  MD5

                  ea96d8162a586640d7ac631f52b83372

                  SHA1

                  36984ec6b439cd61210b80ba29c46348310aecdd

                  SHA256

                  5e74ac75bf1609aa8e05316d19121e24b095b6796dd330d6fa7a6c084db2c03b

                  SHA512

                  f561b801aec17d899c260dcb06d46b8664f82e9be6cb6791c567ffd76c175a1eb2668a9f4806b403db8c9eca343c906562771b88a45d67fc2b197bb5f0cc2ceb

                • C:\Windows\_temp05212022386408\pic\ver.ico
                  Filesize

                  22KB

                  MD5

                  3b456048c963f39b7b918c34742dff8d

                  SHA1

                  8dd5bd2f1dc5f896d3cb14cdec7691c42a60ec9a

                  SHA256

                  d352bbe8c271cc9007a841a5b7db960262fc85cae580f9814eb0b5c7e7e0b7e8

                  SHA512

                  abc38e1de5d9c982975965b784b692f6e8220bcb6e19cf0e66105a3207477f7cc03710e4563aa86666cfc4c411b0ea110c9e9efe827d26ea76a5e82010629a96

                • C:\Windows\_temp05212022386408\pic\zanzhu.ico
                  Filesize

                  24KB

                  MD5

                  94306384efdadfdcea096a022738bf1e

                  SHA1

                  72385c23173686ac2500ba3bca094c0c94e76212

                  SHA256

                  9672b50641ba9f9f1735fee2d3ba4fdc5bda18545530ee1869e01c25618c1345

                  SHA512

                  38f7de2ab148daea9f879665459fe374b1032b10eb1be6769fa17ffc8fc9b12a4bf8b9822a3bca2c8704aec7a996d5fe058e2a759a21f351162a8fcca729bbdf

                • memory/1164-145-0x0000000000000000-mapping.dmp
                • memory/1168-131-0x0000000000000000-mapping.dmp
                • memory/1752-147-0x0000000000000000-mapping.dmp
                • memory/1816-135-0x0000000000000000-mapping.dmp
                • memory/1848-130-0x0000000000000000-mapping.dmp
                • memory/2832-134-0x0000000000000000-mapping.dmp
                • memory/3572-136-0x0000000000000000-mapping.dmp
                • memory/3872-137-0x0000000000000000-mapping.dmp
                • memory/4252-142-0x0000000000000000-mapping.dmp
                • memory/4628-138-0x0000000000000000-mapping.dmp
                • memory/4920-143-0x0000000000000000-mapping.dmp