Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 02:58

General

  • Target

    0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe

  • Size

    264KB

  • MD5

    4716e1ece995483a7218df80bc8956d6

  • SHA1

    453684c742ba590b0e5d973cebe019f091958ec6

  • SHA256

    0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d

  • SHA512

    163db67ba0c82471c5e9349ec3895114d367a4346b7359091fc059edd4966cbe4782d8210060e1f4413f2458e57417b9af01ff1d4e7dc8c5b88295640b08a4c9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe
    "C:\Users\Admin\AppData\Local\Temp\0b7bef52d773bd59c1540e0f416f8665d5bc1d69d998246368b06ac2a7dfc00d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe
      "C:\Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfd17113c.bat"
      2⤵
      • Deletes itself
      • Suspicious use of AdjustPrivilegeToken
      PID:896
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1120
        • C:\Program Files\Windows Mail\WinMail.exe
          "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
          1⤵
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:528
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-314046018-1998522845-17196007281341821037752548319-4005333582009595543-413450158"
          1⤵
            PID:1092
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1144
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1528
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1592
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1776
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1164
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:1324

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      2
                      T1112

                      Discovery

                      Query Registry

                      1
                      T1012

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\tmpfd17113c.bat
                        Filesize

                        307B

                        MD5

                        293ca57e3eb8973c498a047b4b2c6b81

                        SHA1

                        bb528e053e1d94b0d046bdd96d0222336469c734

                        SHA256

                        4d7c51bee12d3b3822dc3fc980dfd7d747147b9ac31a343f53237f59c53d6ae3

                        SHA512

                        ad27fa3291240a9bc437c078314e1b6ceb1cb6399e672b9d168f17b267b75e29bc408534bafcc6dafd822a252f895a7f66661ce5ce72743942aa88d861a936fe

                      • C:\Users\Admin\AppData\Roaming\Ecqauqwo\oxuvreviyne.nih
                        Filesize

                        4KB

                        MD5

                        3290646a97b69434708d5692a1f13d1c

                        SHA1

                        86ddd8c4a0cc396fae843228870b3f5403c4914a

                        SHA256

                        c65129dca0365ead580d28860fd33ba7f56b5c1500bc1e07610f0c3d279beaa8

                        SHA512

                        e508e4b08ce411c6696d3b11480960647ba78bc335a62feb4febb6687f5b69cb80b9972931a55164bf00afdc7711cc6d6a23055de838af0195c8c180d90bca46

                      • C:\Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe
                        Filesize

                        264KB

                        MD5

                        c4481958fae68d5b1210ca1b2d95b0b2

                        SHA1

                        bdc303c29723a501498a0c38c7d4491c9fda176c

                        SHA256

                        ea28948e71b805df6112f82809ac6cd0b6e6e2d8edb69222ab9241e49db03730

                        SHA512

                        136a23e4efcf128c7e5469a73e2de66e520b3d37b94c94add3d8071680f252310e76510424271728a9fd6ad6306370ef6f6a6ba242fbe9cd52d6445508518173

                      • C:\Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe
                        Filesize

                        264KB

                        MD5

                        c4481958fae68d5b1210ca1b2d95b0b2

                        SHA1

                        bdc303c29723a501498a0c38c7d4491c9fda176c

                        SHA256

                        ea28948e71b805df6112f82809ac6cd0b6e6e2d8edb69222ab9241e49db03730

                        SHA512

                        136a23e4efcf128c7e5469a73e2de66e520b3d37b94c94add3d8071680f252310e76510424271728a9fd6ad6306370ef6f6a6ba242fbe9cd52d6445508518173

                      • \Users\Admin\AppData\Local\Temp\tmp1D43.tmp
                        Filesize

                        1.1MB

                        MD5

                        9b98d47916ead4f69ef51b56b0c2323c

                        SHA1

                        290a80b4ded0efc0fd00816f373fcea81a521330

                        SHA256

                        96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

                        SHA512

                        68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

                      • \Users\Admin\AppData\Local\Temp\tmp21.tmp
                        Filesize

                        1.2MB

                        MD5

                        d124f55b9393c976963407dff51ffa79

                        SHA1

                        2c7bbedd79791bfb866898c85b504186db610b5d

                        SHA256

                        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                        SHA512

                        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                      • \Users\Admin\AppData\Local\Temp\tmp6549.tmp
                        Filesize

                        1.2MB

                        MD5

                        d124f55b9393c976963407dff51ffa79

                        SHA1

                        2c7bbedd79791bfb866898c85b504186db610b5d

                        SHA256

                        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                        SHA512

                        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                      • \Users\Admin\AppData\Local\Temp\tmp670E.tmp
                        Filesize

                        1.1MB

                        MD5

                        9b98d47916ead4f69ef51b56b0c2323c

                        SHA1

                        290a80b4ded0efc0fd00816f373fcea81a521330

                        SHA256

                        96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

                        SHA512

                        68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

                      • \Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe
                        Filesize

                        264KB

                        MD5

                        c4481958fae68d5b1210ca1b2d95b0b2

                        SHA1

                        bdc303c29723a501498a0c38c7d4491c9fda176c

                        SHA256

                        ea28948e71b805df6112f82809ac6cd0b6e6e2d8edb69222ab9241e49db03730

                        SHA512

                        136a23e4efcf128c7e5469a73e2de66e520b3d37b94c94add3d8071680f252310e76510424271728a9fd6ad6306370ef6f6a6ba242fbe9cd52d6445508518173

                      • \Users\Admin\AppData\Roaming\Utdiocza\eftynenai.exe
                        Filesize

                        264KB

                        MD5

                        c4481958fae68d5b1210ca1b2d95b0b2

                        SHA1

                        bdc303c29723a501498a0c38c7d4491c9fda176c

                        SHA256

                        ea28948e71b805df6112f82809ac6cd0b6e6e2d8edb69222ab9241e49db03730

                        SHA512

                        136a23e4efcf128c7e5469a73e2de66e520b3d37b94c94add3d8071680f252310e76510424271728a9fd6ad6306370ef6f6a6ba242fbe9cd52d6445508518173

                      • memory/896-180-0x000000000007025A-mapping.dmp
                      • memory/896-241-0x0000000000050000-0x0000000000097000-memory.dmp
                        Filesize

                        284KB

                      • memory/896-261-0x0000000000050000-0x0000000000097000-memory.dmp
                        Filesize

                        284KB

                      • memory/1120-74-0x0000000001F00000-0x0000000001F47000-memory.dmp
                        Filesize

                        284KB

                      • memory/1120-69-0x0000000001F00000-0x0000000001F47000-memory.dmp
                        Filesize

                        284KB

                      • memory/1120-71-0x0000000001F00000-0x0000000001F47000-memory.dmp
                        Filesize

                        284KB

                      • memory/1120-72-0x0000000001F00000-0x0000000001F47000-memory.dmp
                        Filesize

                        284KB

                      • memory/1120-73-0x0000000001F00000-0x0000000001F47000-memory.dmp
                        Filesize

                        284KB

                      • memory/1180-77-0x0000000000120000-0x0000000000167000-memory.dmp
                        Filesize

                        284KB

                      • memory/1180-79-0x0000000000120000-0x0000000000167000-memory.dmp
                        Filesize

                        284KB

                      • memory/1180-80-0x0000000000120000-0x0000000000167000-memory.dmp
                        Filesize

                        284KB

                      • memory/1180-78-0x0000000000120000-0x0000000000167000-memory.dmp
                        Filesize

                        284KB

                      • memory/1220-83-0x0000000002AC0000-0x0000000002B07000-memory.dmp
                        Filesize

                        284KB

                      • memory/1220-86-0x0000000002AC0000-0x0000000002B07000-memory.dmp
                        Filesize

                        284KB

                      • memory/1220-85-0x0000000002AC0000-0x0000000002B07000-memory.dmp
                        Filesize

                        284KB

                      • memory/1220-84-0x0000000002AC0000-0x0000000002B07000-memory.dmp
                        Filesize

                        284KB

                      • memory/1784-61-0x0000000000000000-mapping.dmp
                      • memory/1972-90-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-92-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-93-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-95-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-97-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-99-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-101-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-103-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-105-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-107-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-109-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-111-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-113-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-115-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-117-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-119-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-121-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-123-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-125-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-151-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-91-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-89-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-182-0x0000000002410000-0x0000000002457000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-56-0x0000000000400000-0x0000000000447000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-55-0x0000000000400000-0x0000000000447000-memory.dmp
                        Filesize

                        284KB

                      • memory/1972-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
                        Filesize

                        8KB