Analysis

  • max time kernel
    152s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-07-2022 14:58

General

  • Target

    49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe

  • Size

    1.2MB

  • MD5

    597f6110fa73a2bad89341afed59cd97

  • SHA1

    f17fe429934d5f23219aa3fda89e078efbd9daf1

  • SHA256

    49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51

  • SHA512

    606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
    "C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe"
    1⤵
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    PID:1684
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4A04C0CC-E261-4D11-B7AF-1311B2CDDD93} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:880
    • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1504
    • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe

    Filesize

    1.2MB

    MD5

    597f6110fa73a2bad89341afed59cd97

    SHA1

    f17fe429934d5f23219aa3fda89e078efbd9daf1

    SHA256

    49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51

    SHA512

    606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea

  • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe

    Filesize

    1.2MB

    MD5

    597f6110fa73a2bad89341afed59cd97

    SHA1

    f17fe429934d5f23219aa3fda89e078efbd9daf1

    SHA256

    49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51

    SHA512

    606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea

  • C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe

    Filesize

    1.2MB

    MD5

    597f6110fa73a2bad89341afed59cd97

    SHA1

    f17fe429934d5f23219aa3fda89e078efbd9daf1

    SHA256

    49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51

    SHA512

    606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea

  • memory/1684-54-0x00000000754A1000-0x00000000754A3000-memory.dmp

    Filesize

    8KB