Analysis

  • max time kernel
    167s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 03:50

General

  • Target

    ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed.exe

  • Size

    100KB

  • MD5

    444770900d9219c86424dbe1159950ac

  • SHA1

    192570518f9ac7f19adca9b4faf717280deb86cd

  • SHA256

    ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed

  • SHA512

    7ab86b955894231b36b098d1d70aa73c28473271585a0962e386f1d3c32fc34e3b1258910941679a94b449c68038630e03257c3129b5edcaf119752fcfa42716

  • SSDEEP

    1536:1fVvHhBAZ08z3jeeXNXS3zOgyaiQPEigSsA3SIcQyozsm24vw+cXXxXA:fv/Ifz3jeedmz25igSsA3dImbvncXBw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed.exe
    "C:\Users\Admin\AppData\Local\Temp\ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\smss.exe
      C:\Windows\smss.exe auto
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:4816
    • C:\progra~1\Intern~1\iexplore.exe
      C:\\progra~1\\Intern~1\\iexplore.exe http://jianqiang960851442.com/AddSetup.asp?57;€UQ44457€7€=35=36466$;>65>94$EQ€<5
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4800 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          1520b1f0e8660cc8553264ce46871efd

          SHA1

          70c43f2c0b7599f782461590f8e1650a2df5dbfe

          SHA256

          8bb8dd5446da57093db31c10b4093a2378a9324f137d3eaa21ab0027e191c09e

          SHA512

          6ad8d5f620738988286981654070c9a4e2542f629f4e5245381143a2a88c98922145759ff8d90546e1a617639a7dd335ddca4aba5435fb216c01c705bc4f0be0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          a5479bf34157fcedae2be308fdfc3ec4

          SHA1

          4015d4f1a2d21bb761a10cea9722cdd67e055ea0

          SHA256

          d91a233edfdced93b596da0715c9d4b053c1cfaf2eb622bcea6934344dea9b4f

          SHA512

          8328960de9d0a3544a2b573d21cb627d3b9e089b5a04de957b2487612d5f408dfea0e7b4a7cfc630f4d76b189dda1086d4d62b2eaf384b6aef5f47661deba262

        • C:\Windows\smss.exe

          Filesize

          100KB

          MD5

          444770900d9219c86424dbe1159950ac

          SHA1

          192570518f9ac7f19adca9b4faf717280deb86cd

          SHA256

          ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed

          SHA512

          7ab86b955894231b36b098d1d70aa73c28473271585a0962e386f1d3c32fc34e3b1258910941679a94b449c68038630e03257c3129b5edcaf119752fcfa42716

        • C:\Windows\smss.exe

          Filesize

          100KB

          MD5

          444770900d9219c86424dbe1159950ac

          SHA1

          192570518f9ac7f19adca9b4faf717280deb86cd

          SHA256

          ecaf99c548f87742ad7d861beedbd3a599f7fe014ac7e0fd60a721069b2ed4ed

          SHA512

          7ab86b955894231b36b098d1d70aa73c28473271585a0962e386f1d3c32fc34e3b1258910941679a94b449c68038630e03257c3129b5edcaf119752fcfa42716

        • memory/4800-143-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-142-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-145-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-146-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-147-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-148-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-149-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-150-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-153-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-152-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-151-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-154-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-158-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-156-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-160-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-161-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-163-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-162-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-166-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-164-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-170-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-171-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-169-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-168-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-172-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-173-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-174-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-175-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-176-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-180-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-181-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-182-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-183-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-184-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-189-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-193-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-192-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-194-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-191-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-190-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-196-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-197-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4800-201-0x00007FFCC5A90000-0x00007FFCC5AFE000-memory.dmp

          Filesize

          440KB

        • memory/4924-132-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB