Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 03:30

General

  • Target

    15c19adb109baf0a3bc3ce5a40933ab26930be5c2115ed3527834d9e02809905.exe

  • Size

    361KB

  • MD5

    32f2bbcb73cbd6c8367cc7719b9ec32e

  • SHA1

    a3ae07d5547294f4702c25837f6ebde6c57c9f22

  • SHA256

    15c19adb109baf0a3bc3ce5a40933ab26930be5c2115ed3527834d9e02809905

  • SHA512

    9bab585b0f6ef08958aa29b7ab2aace2f06ea19851cc908985823017c753278763b10174765bda36384ae2f031347df8eb2072a02a34a58ad067ec941632f4ba

  • SSDEEP

    6144:eflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:eflfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15c19adb109baf0a3bc3ce5a40933ab26930be5c2115ed3527834d9e02809905.exe
    "C:\Users\Admin\AppData\Local\Temp\15c19adb109baf0a3bc3ce5a40933ab26930be5c2115ed3527834d9e02809905.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Temp\hcyuqiwsojfylhdz.exe
      C:\Temp\hcyuqiwsojfylhdz.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\haxlifyvro.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1720
        • C:\Temp\haxlifyvro.exe
          C:\Temp\haxlifyvro.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1268
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1080
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1124
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • C:\Temp\haxlifyvro.exe

    Filesize

    361KB

    MD5

    28ab8f17cb635281251e85c7e2764f71

    SHA1

    8e05534ff1f8d84540d73d4364d294b41ea21f13

    SHA256

    628ddc7025851e3a3297da1d23202162660a036283695038cd4674e844352ef5

    SHA512

    5af26ff47ffdadbda336ea34e93c2b3052e81a8489521172f9e1886ede3bed5e2ea3a786153ac320de3403c7934b1299da264170a95bdb0a1fd5f023b5f7d55d

  • C:\Temp\hcyuqiwsojfylhdz.exe

    Filesize

    361KB

    MD5

    953820d2464c55645cfb0dfdad10a0bf

    SHA1

    c7b9176ce95218f840e01d1a2917d154953c2eaa

    SHA256

    15b14de4067b61fddbf562d1922035a07406aca47203b5cd0e71d9078bb62342

    SHA512

    e33f23800471212c0e63e20f1e0ca9baf8abe1fce855f200c04bf81c55cade9fbbf5efc782cd55923e8a55a0554ba5f2ca7b9673e72f0206cd038219e00dbfc0

  • C:\Temp\hcyuqiwsojfylhdz.exe

    Filesize

    361KB

    MD5

    953820d2464c55645cfb0dfdad10a0bf

    SHA1

    c7b9176ce95218f840e01d1a2917d154953c2eaa

    SHA256

    15b14de4067b61fddbf562d1922035a07406aca47203b5cd0e71d9078bb62342

    SHA512

    e33f23800471212c0e63e20f1e0ca9baf8abe1fce855f200c04bf81c55cade9fbbf5efc782cd55923e8a55a0554ba5f2ca7b9673e72f0206cd038219e00dbfc0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\1BKUPL2L.txt

    Filesize

    608B

    MD5

    4d0452185cf17e286f4d152a5635d097

    SHA1

    ca43c9a73d7428c6da886b7a45cc9efa67bd047d

    SHA256

    74f575fa6c7d0ae42acb8e0adaa555a42558183b7c8cf681c7a69702ea45a524

    SHA512

    022688807376861f570523403404962193d39cfdd814286f6cc4fc85320e1cd85d8329dd4eb22803216f2c830dad5ad2f462db4d6682a1c7a1057e57bb409ab9

  • C:\temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    a9ea404eeabfecf47046e6d50a07110a

    SHA1

    97ff7f3beb1dec5e3f90e7604894c77180d9afce

    SHA256

    bac6f75eb2da3c9b7374591d7a20a8f2d2a4bbf24ee34f1f5e645e59d4907b7f

    SHA512

    d5e35fc92aa7d7420a43b1694bdd9356e6707274e790a11c460ea982ae70ec94e381d6d17b9039e74ce5b67fb37fe9b9caa4d3c53337532ec596bdc2116143d9

  • \Temp\hcyuqiwsojfylhdz.exe

    Filesize

    361KB

    MD5

    953820d2464c55645cfb0dfdad10a0bf

    SHA1

    c7b9176ce95218f840e01d1a2917d154953c2eaa

    SHA256

    15b14de4067b61fddbf562d1922035a07406aca47203b5cd0e71d9078bb62342

    SHA512

    e33f23800471212c0e63e20f1e0ca9baf8abe1fce855f200c04bf81c55cade9fbbf5efc782cd55923e8a55a0554ba5f2ca7b9673e72f0206cd038219e00dbfc0

  • memory/1080-65-0x0000000000000000-mapping.dmp

  • memory/1628-55-0x0000000000000000-mapping.dmp

  • memory/1720-61-0x0000000000000000-mapping.dmp