Analysis

  • max time kernel
    151s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 15:25

General

  • Target

    5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe

  • Size

    298KB

  • MD5

    bae857d595c43964c0ca2fb3343e0e03

  • SHA1

    c72272e0eca993702900a8a56d3d392c00dd6c5e

  • SHA256

    5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b

  • SHA512

    f4569ecf284e5e9b0a6e6a06ee06de20fcd2adefd0bfb4da3c46baf49bf4ba98f5ac3e33c3a8abb80428ee47fdfbc0ebb8796d63d5292c5a5ec988ad9022a8d7

  • SSDEEP

    3072:9ape7FPXvomWqLEnCYvcvIXRTy1hmUI0xlOcw1IvS3oGcFuG9hFoHk148GzMwcp7:W0XAvDx8hzNxl81IvSiFxTO8GzMf

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe
        "C:\Users\Admin\AppData\Local\Temp\5432da045e41ec160ab6eb81fb23d3835f6da9393f5cbfedf9da67d17b883b6b.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe
          "C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:964
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc7adde18.bat"
          3⤵
          • Deletes itself
          PID:868
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1120

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpc7adde18.bat

          Filesize

          307B

          MD5

          8f49cfb243b6740738eb546f86e347d5

          SHA1

          91a89ef667d4d28e0cf9e133a45a29f94c0172d0

          SHA256

          9b19b16d8a763772e4b6b99c5e90873b93baf40cd2116895f7baa4aad9ea66d9

          SHA512

          2ff15671db04e6d7c8eb054d03f0790d720398c0e5c47f755bcc3a160b07f45c4e3a55907811a7f2ba45cc19b65767901065e026b74cc5784f012b5c51fe4d2a

        • C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe

          Filesize

          298KB

          MD5

          030099d6a0da363a54b233f960558071

          SHA1

          1986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd

          SHA256

          865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b

          SHA512

          afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784

        • C:\Users\Admin\AppData\Roaming\Peulc\xiyp.exe

          Filesize

          298KB

          MD5

          030099d6a0da363a54b233f960558071

          SHA1

          1986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd

          SHA256

          865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b

          SHA512

          afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784

        • \Users\Admin\AppData\Roaming\Peulc\xiyp.exe

          Filesize

          298KB

          MD5

          030099d6a0da363a54b233f960558071

          SHA1

          1986cf8b5c2e6ff95fbf6b26ba0b1facebf07bfd

          SHA256

          865faf8a2b5e730df599dab38532820fd2c3111fa7c1f1200eb558126a2e884b

          SHA512

          afeb70b67c29a5dab706c0c9ac48174eb1b0d2d1a0df9f75e98ccee494f179dcab164a121841652977be1e3e1f1371185f347d1a120e710057348fe5fa23a784

        • memory/868-97-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/868-104-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/868-94-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/868-98-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/868-96-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/964-82-0x0000000000350000-0x000000000039E000-memory.dmp

          Filesize

          312KB

        • memory/964-84-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/964-80-0x0000000000280000-0x00000000002C4000-memory.dmp

          Filesize

          272KB

        • memory/1120-64-0x00000000004A0000-0x00000000004E4000-memory.dmp

          Filesize

          272KB

        • memory/1120-67-0x00000000004A0000-0x00000000004E4000-memory.dmp

          Filesize

          272KB

        • memory/1120-66-0x00000000004A0000-0x00000000004E4000-memory.dmp

          Filesize

          272KB

        • memory/1120-65-0x00000000004A0000-0x00000000004E4000-memory.dmp

          Filesize

          272KB

        • memory/1120-62-0x00000000004A0000-0x00000000004E4000-memory.dmp

          Filesize

          272KB

        • memory/1176-73-0x0000000001B50000-0x0000000001B94000-memory.dmp

          Filesize

          272KB

        • memory/1176-72-0x0000000001B50000-0x0000000001B94000-memory.dmp

          Filesize

          272KB

        • memory/1176-71-0x0000000001B50000-0x0000000001B94000-memory.dmp

          Filesize

          272KB

        • memory/1176-70-0x0000000001B50000-0x0000000001B94000-memory.dmp

          Filesize

          272KB

        • memory/1204-83-0x0000000002950000-0x0000000002994000-memory.dmp

          Filesize

          272KB

        • memory/1204-85-0x0000000002950000-0x0000000002994000-memory.dmp

          Filesize

          272KB

        • memory/1204-81-0x0000000002950000-0x0000000002994000-memory.dmp

          Filesize

          272KB

        • memory/1204-78-0x0000000002950000-0x0000000002994000-memory.dmp

          Filesize

          272KB

        • memory/1964-79-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1964-90-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1964-91-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1964-89-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1964-88-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1964-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

          Filesize

          8KB

        • memory/1964-77-0x0000000000370000-0x00000000003BE000-memory.dmp

          Filesize

          312KB

        • memory/1964-74-0x0000000000290000-0x00000000002D4000-memory.dmp

          Filesize

          272KB

        • memory/1964-100-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/1964-101-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1964-56-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/1964-55-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB