Analysis

  • max time kernel
    93s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 05:01

General

  • Target

    cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe

  • Size

    88KB

  • MD5

    642fd7cb5e109163b7234292800dd0dc

  • SHA1

    a5afef724ab436d4f0a19c051a43b1b5e7450f48

  • SHA256

    cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c

  • SHA512

    6fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423

  • SSDEEP

    1536:AP5IAiR6aZrA062bNGsr/nhD7r453ktoBwJAMF+8f2:Q5IsUrj62bNGsr/e53k3JAMFW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 23 IoCs
  • Modifies registry class 5 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 23 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe
    "C:\Users\Admin\AppData\Local\Temp\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\705.5475.bat""
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:1156
      • C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe
        "C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:984
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "?mac=6A:94:ED:CE:DC:7A&ver=1.0"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1640
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:916
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /pid 1640
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:528
        • C:\Windows\SysWOW64\net.exe
          net stop sharedaccess
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop sharedaccess
            5⤵
              PID:1256
          • \??\c:\windows\explorer.exe
            "c:\windows\explorer.exe"
            4⤵
            • Modifies Installed Components in the registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:768
            • C:\Program Files\vstart.exe
              "C:\Program Files\vstart.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:972
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x518
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:544

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\705.5475.bat

        Filesize

        433B

        MD5

        19e46e4bc0a9c17cdb68ebe72806dbe4

        SHA1

        4fd151702fd31271e1c34a80a6f8d4a775cc84ef

        SHA256

        b07e13f65a66a10ebc644d966405968e655bcdb38d87eb27e65fc575d5fc8989

        SHA512

        a8bd95d82135bd5cfaccedf3710682e498ad22e015a334032d4371305d45469c0c79d683e166640d4bfb2fc39b2e57ace8ad96ca62eb61bd1d18f3b853aa24af

      • C:\Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe

        Filesize

        88KB

        MD5

        642fd7cb5e109163b7234292800dd0dc

        SHA1

        a5afef724ab436d4f0a19c051a43b1b5e7450f48

        SHA256

        cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c

        SHA512

        6fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423

      • C:\Program Files\vstart.exe

        Filesize

        52KB

        MD5

        333cc8e1009a8fd02d53d20c1dd3680e

        SHA1

        16e4610d0664be2c85f4aa47a8523e7b8505fed5

        SHA256

        4c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb

        SHA512

        aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032

      • \Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe

        Filesize

        88KB

        MD5

        642fd7cb5e109163b7234292800dd0dc

        SHA1

        a5afef724ab436d4f0a19c051a43b1b5e7450f48

        SHA256

        cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c

        SHA512

        6fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423

      • \Program Files\cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c.exe

        Filesize

        88KB

        MD5

        642fd7cb5e109163b7234292800dd0dc

        SHA1

        a5afef724ab436d4f0a19c051a43b1b5e7450f48

        SHA256

        cb503f229f9dc0071998b72c4114f76e96a6b0092ef22a8ff25f8ae58af9e78c

        SHA512

        6fc6ad9b9d81919a399cb53604cf2a04230b02937217dd5757e41801f89163fa5c066b8354a28ba2ee0ff992144de5968787653222be77a16f2e92be1a499423

      • \Program Files\vstart.exe

        Filesize

        52KB

        MD5

        333cc8e1009a8fd02d53d20c1dd3680e

        SHA1

        16e4610d0664be2c85f4aa47a8523e7b8505fed5

        SHA256

        4c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb

        SHA512

        aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032

      • \Program Files\vstart.exe

        Filesize

        52KB

        MD5

        333cc8e1009a8fd02d53d20c1dd3680e

        SHA1

        16e4610d0664be2c85f4aa47a8523e7b8505fed5

        SHA256

        4c8e2abaf959348055248f43ccf81975146aa2af9d0509f06896961bf76af8eb

        SHA512

        aa66d9ee44edde45d9c8244adb530422b4afc8e3361a4476e63c5f200fdc7473b35a0e2e221b4d75571ad7bbed536d27fdade1b6eeafc4544bd3edb0f28f0032

      • memory/624-73-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmp

        Filesize

        8KB

      • memory/972-76-0x0000000076151000-0x0000000076153000-memory.dmp

        Filesize

        8KB