Analysis

  • max time kernel
    150s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2022 16:15

General

  • Target

    18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe

  • Size

    4.7MB

  • MD5

    fc133ce298306a3e8c6443b64d1bf303

  • SHA1

    774ee564f6ae6ce7d0f75e5062b2fa88b00df5da

  • SHA256

    18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a

  • SHA512

    7c4689555eefef79a67b8dd950104755df63f17b50112b266306bafcabdf4e81d5403b61e8074decae9dfbdd1b4ce1d48fefabc8aa1e6f224f2b1c86e070a917

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
    "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_fchey4s.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES502.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4D2.tmp"
        3⤵
          PID:932
      • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
        "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
        2⤵
          PID:1124
        • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
          "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
          2⤵
            PID:1520
          • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
            "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
            2⤵
              PID:1924
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "explorer" /t REG_SZ /d "C:\Windows\system32\aBOBGSnm.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1388
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "explorer" /t REG_SZ /d "C:\Windows\system32\aBOBGSnm.exe
                3⤵
                • Adds Run key to start application
                PID:1112
            • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
              "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
              2⤵
                PID:460
              • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                2⤵
                  PID:1716
                • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                  "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                  2⤵
                    PID:852
                  • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                    "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                    2⤵
                      PID:1632
                    • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                      "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                      2⤵
                        PID:2044
                      • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                        "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                        2⤵
                          PID:2020
                        • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                          "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                          2⤵
                            PID:1020
                          • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                            "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                            2⤵
                              PID:1112
                            • C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe
                              "C:\Users\Admin\AppData\Local\Temp\18a0c8d80b21635c34073b6bfc676f999739c5c65ec35b53612b737f1ce9182a.exe"
                              2⤵
                                PID:1492

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Defense Evasion

                            Modify Registry

                            1
                            T1112

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\RES502.tmp
                              Filesize

                              1KB

                              MD5

                              a6a35ee9f256c6644e301cde3dcfff04

                              SHA1

                              5b8c747f7fc3c7e8b88418b24b0cbc5dbd9a4e54

                              SHA256

                              b1efe094f6558fbd1eb9b4fdb27be79371b2a4f2a6e3db6a6727a7af1e91c3b7

                              SHA512

                              fbed63b49205939790a3caa38a186edd0de226bb1e279c9f9fce08a7e21ea693539427704bf6d73452b7ccd86d3a9a5b301db7a1cdcc661e7bf915a09384fc29

                            • C:\Users\Admin\AppData\Local\Temp\_fchey4s.dll
                              Filesize

                              9.3MB

                              MD5

                              aec3e8f700c7a5583e60efdbd7c1fb6b

                              SHA1

                              36f9993eb4d6a8c9c06783bdc896a3e57fc3bb20

                              SHA256

                              498d705df12067c988be9a8977051895d1660dec065dc221846f9b4a864a82ae

                              SHA512

                              0b9f3306dc0b17c0a2a263732aabe6e3202c71f22c9e7d681f7a4dc05b7afcb38c113835e878fac5cad0c917801b6bbfed1f0ee33c5dc0f18055f18baaee93df

                            • \??\c:\Users\Admin\AppData\Local\Temp\CSC4D2.tmp
                              Filesize

                              652B

                              MD5

                              18729a74427672a982e9d25abdb3a30c

                              SHA1

                              fe533a82e350d7b9f8629b5e9886cbfa3800933a

                              SHA256

                              13e464a7c0053be11b43c03755fbfad32df526cae7d1fa0a7a2740d7796b744b

                              SHA512

                              261fea9a3e13b4dad51def8146a8c600d04b1afcccda0ce31f683841d5b340801106052aebe75a09fd0bb780c19954e16fe2ad1a793e491496db09c4d1e24a5b

                            • \??\c:\Users\Admin\AppData\Local\Temp\_fchey4s.cmdline
                              Filesize

                              194B

                              MD5

                              dd1b7c4c05a47855d82b3ecd3e16e514

                              SHA1

                              7d3ad5b48ea3e0778a165024a1ce20eb66bfc739

                              SHA256

                              87d059323079feaf3324900d8cd8a485d8af5f961ea6b5e40aae576237c657cd

                              SHA512

                              8db6b4815361e200a4178f55d9c6cbd27c459ce8fbe45355e3f478215d84a5fbd91839aae9a63eca106bd01706695275b603a0d160a0bba104fafc6879c5822e

                            • \??\c:\Users\Admin\AppData\Local\Temp\tmp40.tmp.txt
                              Filesize

                              4.7MB

                              MD5

                              51ebb7a4e323a95de7274867baa9f29d

                              SHA1

                              e8020abf1e404020cfa2a2079c47d24d4e4f48be

                              SHA256

                              24ef1ca05d32b4253a07e0857e9cd81915e4dccab0b7e7f6cce000e88417c34a

                              SHA512

                              6a0b4fc6f4c0db58a314403115f7e079882fb2d20ac35699fd32679471608def8f71268286c739923afb782264f1748df6e85c1a1a12c4686d275f11ceebd1dc

                            • memory/460-123-0x000000000043C0B2-mapping.dmp
                            • memory/540-55-0x0000000000000000-mapping.dmp
                            • memory/852-155-0x000000000043C0B2-mapping.dmp
                            • memory/932-59-0x0000000000000000-mapping.dmp
                            • memory/1020-219-0x000000000043C0B2-mapping.dmp
                            • memory/1112-106-0x0000000000000000-mapping.dmp
                            • memory/1112-235-0x000000000043C0B2-mapping.dmp
                            • memory/1124-63-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-71-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-74-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-76-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-78-0x000000000043C0B2-mapping.dmp
                            • memory/1124-69-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-66-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1124-64-0x0000000000400000-0x000000000043D000-memory.dmp
                              Filesize

                              244KB

                            • memory/1388-105-0x0000000000000000-mapping.dmp
                            • memory/1492-251-0x000000000043C0B2-mapping.dmp
                            • memory/1500-54-0x0000000076291000-0x0000000076293000-memory.dmp
                              Filesize

                              8KB

                            • memory/1500-58-0x0000000074750000-0x0000000074CFB000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/1500-107-0x0000000074750000-0x0000000074CFB000-memory.dmp
                              Filesize

                              5.7MB

                            • memory/1520-104-0x000000000043C0B2-mapping.dmp
                            • memory/1632-171-0x000000000043C0B2-mapping.dmp
                            • memory/1716-139-0x000000000043C0B2-mapping.dmp
                            • memory/1924-99-0x0000000000771B7E-mapping.dmp
                            • memory/1924-95-0x0000000000400000-0x0000000000776000-memory.dmp
                              Filesize

                              3.5MB

                            • memory/1924-91-0x0000000000400000-0x0000000000776000-memory.dmp
                              Filesize

                              3.5MB

                            • memory/1924-87-0x0000000000400000-0x0000000000776000-memory.dmp
                              Filesize

                              3.5MB

                            • memory/1924-83-0x0000000000400000-0x0000000000776000-memory.dmp
                              Filesize

                              3.5MB

                            • memory/1924-80-0x0000000000400000-0x0000000000776000-memory.dmp
                              Filesize

                              3.5MB

                            • memory/2020-203-0x000000000043C0B2-mapping.dmp
                            • memory/2044-187-0x000000000043C0B2-mapping.dmp