Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 03:34

General

  • Target

    6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe

  • Size

    361KB

  • MD5

    437309d104ca341348f98d56425358fc

  • SHA1

    41494a4c7d122570ea1d14f1ba9605b0242134f5

  • SHA256

    6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c

  • SHA512

    8e140990002713aacdb5a5c42e2cf39c911f0660b75ec9a7da6ebc3e29a1dd56018d3dc3c2150e4e8ecf176a33caafb603b830cad57a7da7b482d405f5416973

  • SSDEEP

    6144:WflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:WflfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe
    "C:\Users\Admin\AppData\Local\Temp\6d131c347e95abc7aedf92773ee5b94593279c62bf02528365544a663bf0826c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Temp\bwnlhfbzqlkidcxo.exe
      C:\Temp\bwnlhfbzqlkidcxo.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\yvrnnjgcqq.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1848
        • C:\Temp\yvrnnjgcqq.exe
          C:\Temp\yvrnnjgcqq.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:840
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • C:\Temp\bwnlhfbzqlkidcxo.exe

    Filesize

    361KB

    MD5

    7f2ce49fe520aedfafc7334c69f20802

    SHA1

    6ebdee2cf71095d9e126d4b7a3935c7fb446df3c

    SHA256

    f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23

    SHA512

    bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4

  • C:\Temp\bwnlhfbzqlkidcxo.exe

    Filesize

    361KB

    MD5

    7f2ce49fe520aedfafc7334c69f20802

    SHA1

    6ebdee2cf71095d9e126d4b7a3935c7fb446df3c

    SHA256

    f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23

    SHA512

    bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4

  • C:\Temp\yvrnnjgcqq.exe

    Filesize

    361KB

    MD5

    dc11cbcf1949d1c3b0e4dc6318903c38

    SHA1

    2a60fb8845dbac3f2f9990067d9a8c4badd7fecf

    SHA256

    d9e720ca484d6b3a34223d78a3bd10972302f949d46af687771785ffe93aea00

    SHA512

    1818bc47a7e0f29f81e55d12a5e74e3eedd6badd49640dcf8348b75f8582d9df4d61302fa58cc5257781da1f2dcc924af5d222fc16f771c710e1b6acfab08377

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\49SBLBE5.txt

    Filesize

    603B

    MD5

    a53c5a1867dab74e41e03ed5fb7f7bb1

    SHA1

    d23aa5a1f8dc0f6af0657d54e3b1765395a61a4e

    SHA256

    e4e1eadcb466a9e41464c3bb417c1911431f698973385e3bed406750eab88d0f

    SHA512

    f8c288d6e702105fab4da054941a88a0ff1f4fddab8a744eef6730c9432e8ec8634f05f62b7a555417e53797e088fbbc942bd78dd84538cb2b768a7ced7fb11b

  • C:\temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    ed1876d3b75dd447cc73b64cda6f6894

    SHA1

    3164f471810f92b365c5ef21b958b8b5daeac990

    SHA256

    22f03e6ff70b32e91435f6ae7678fd8dcef8fd95d452bcef8fce4e2b2915a253

    SHA512

    de05a7383d3ee9725fbcc619d56037241543dbb7fc7d4e9efd48f0164bc43e164e3750fd2bd8f1631606036d05819888bbcf3a2464ab9d9765be5dc15c2de01b

  • \Temp\bwnlhfbzqlkidcxo.exe

    Filesize

    361KB

    MD5

    7f2ce49fe520aedfafc7334c69f20802

    SHA1

    6ebdee2cf71095d9e126d4b7a3935c7fb446df3c

    SHA256

    f31bb19fde66cd187d4a288336c0ff5e7002cc76ee89da23408e54a17a738b23

    SHA512

    bbec5ecc31044d7b41d2ed4c9fb00cdc4ebc59c14276cffb7f7b646828bc5b521a2420ed3f4ec519a61988dd84f90d8f3ce0f232c562696b61c0532b80df23f4