Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 19:03

General

  • Target

    6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe

  • Size

    295KB

  • MD5

    86da2f013eb3abc310b142a5f317129b

  • SHA1

    49dd0da652510dd5e8fa9a30d04bda208e83f186

  • SHA256

    6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7

  • SHA512

    3bfd6d1fba78a6fcf5dddec449a539849fe4f70ffc8555b139cd6b1c5f3fb1731ff501f7efecc88c6d9a1b40ce11e5006dc3d2aa28b13c501d4868d1cadc5dd4

  • SSDEEP

    6144:BiGtsLOAlqNC+I+1PTG/qm/PgCnmUSFMhl4f+M/oI29dK9:0GtsLVt+N1PTEn/iUSFM8f+rI2g9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1264
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1340
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1400
          • C:\Users\Admin\AppData\Local\Temp\6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe
            "C:\Users\Admin\AppData\Local\Temp\6e42905e799a7eb381fac7295945677cc4862273179e0590890867ad51bc07e7.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe
              "C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:984
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7a119288.bat"
              3⤵
              • Deletes itself
              PID:1700

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp7a119288.bat

          Filesize

          307B

          MD5

          1c13bf85e846a2a105bcdd890d20abfe

          SHA1

          6cade25bbf7b0290861f26edba01a18d30bb5df8

          SHA256

          8258b562650bae8eb131ce87ca4884fb94de56bd764a26b7cd269783b874ea99

          SHA512

          99454ba649edbab71c762c0dcdce852298aaa4dc7a0a67c2f856c2afdb920a4a45fc7ca3a57898c87a3475b4b4ddcc44d412e644e6de68e9c382fbf43aa26e7c

        • C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe

          Filesize

          295KB

          MD5

          4ad0f9b77094bf54233a2c8c90a68bff

          SHA1

          13bea6283097bb5f98756e758de62ab504f21a33

          SHA256

          d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82

          SHA512

          6c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7

        • C:\Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe

          Filesize

          295KB

          MD5

          4ad0f9b77094bf54233a2c8c90a68bff

          SHA1

          13bea6283097bb5f98756e758de62ab504f21a33

          SHA256

          d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82

          SHA512

          6c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7

        • \Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe

          Filesize

          295KB

          MD5

          4ad0f9b77094bf54233a2c8c90a68bff

          SHA1

          13bea6283097bb5f98756e758de62ab504f21a33

          SHA256

          d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82

          SHA512

          6c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7

        • \Users\Admin\AppData\Roaming\Ongiyx\ijejse.exe

          Filesize

          295KB

          MD5

          4ad0f9b77094bf54233a2c8c90a68bff

          SHA1

          13bea6283097bb5f98756e758de62ab504f21a33

          SHA256

          d7926285e59da451761b166dac89c47f54658480cb2e99659184342767968b82

          SHA512

          6c32d2a4741b1dd92eae178dda799531cd38de9c1f7d13b9ca4055d3171bd37fb65d2bf81b259a8b76b029dfdcc2c7792c8f90ecb4c32968c6c247ab2ac7aeb7

        • memory/984-99-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/984-98-0x0000000001C40000-0x0000000001C8E000-memory.dmp

          Filesize

          312KB

        • memory/984-59-0x0000000000000000-mapping.dmp

        • memory/984-97-0x0000000001BF0000-0x0000000001C34000-memory.dmp

          Filesize

          272KB

        • memory/1264-63-0x0000000001D20000-0x0000000001D64000-memory.dmp

          Filesize

          272KB

        • memory/1264-66-0x0000000001D20000-0x0000000001D64000-memory.dmp

          Filesize

          272KB

        • memory/1264-67-0x0000000001D20000-0x0000000001D64000-memory.dmp

          Filesize

          272KB

        • memory/1264-68-0x0000000001D20000-0x0000000001D64000-memory.dmp

          Filesize

          272KB

        • memory/1264-65-0x0000000001D20000-0x0000000001D64000-memory.dmp

          Filesize

          272KB

        • memory/1340-71-0x0000000000120000-0x0000000000164000-memory.dmp

          Filesize

          272KB

        • memory/1340-72-0x0000000000120000-0x0000000000164000-memory.dmp

          Filesize

          272KB

        • memory/1340-73-0x0000000000120000-0x0000000000164000-memory.dmp

          Filesize

          272KB

        • memory/1340-74-0x0000000000120000-0x0000000000164000-memory.dmp

          Filesize

          272KB

        • memory/1400-80-0x0000000002A40000-0x0000000002A84000-memory.dmp

          Filesize

          272KB

        • memory/1400-79-0x0000000002A40000-0x0000000002A84000-memory.dmp

          Filesize

          272KB

        • memory/1400-77-0x0000000002A40000-0x0000000002A84000-memory.dmp

          Filesize

          272KB

        • memory/1400-78-0x0000000002A40000-0x0000000002A84000-memory.dmp

          Filesize

          272KB

        • memory/1700-106-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1700-101-0x0000000000074E01-mapping.dmp

        • memory/1700-93-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1700-89-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1700-91-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1700-92-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/2028-95-0x00000000002D0000-0x000000000031E000-memory.dmp

          Filesize

          312KB

        • memory/2028-94-0x0000000000280000-0x00000000002C4000-memory.dmp

          Filesize

          272KB

        • memory/2028-96-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/2028-86-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/2028-85-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/2028-55-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/2028-100-0x00000000022E0000-0x000000000232E000-memory.dmp

          Filesize

          312KB

        • memory/2028-84-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/2028-83-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/2028-102-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/2028-103-0x00000000022E0000-0x0000000002324000-memory.dmp

          Filesize

          272KB

        • memory/2028-56-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/2028-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

          Filesize

          8KB