Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 00:37

General

  • Target

    d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe

  • Size

    305KB

  • MD5

    6b42c667ec04b4363ce4db9ef99d52e0

  • SHA1

    081d2ce224108b75cec0e7c641bc20b188013636

  • SHA256

    d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9

  • SHA512

    78749b714de39cc0cb1f818c0ef44beb38fddbbd5f850f21ee496507d486c5dce1a4f96be7eff4fff07a7b148f06118966bc9b8fc30435637f6f1e470098b7a8

  • SSDEEP

    6144:XREPQ8/32oYMfHGD0A/CTOyGBBHYQgceGpVw3GeF0egQuEKGC4Ni6acTrr4J2:X8/32Z0A6rGyceGpVw2eOeNuEKGDN1LF

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe
        "C:\Users\Admin\AppData\Local\Temp\d75e17b0e708e0a5f3dba94f35fc925d12d67a7af4d569b0efa13433f2eee9e9.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe
          "C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1552
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd2c5b11c.bat"
          3⤵
          • Deletes itself
          PID:992
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\tmpd2c5b11c.bat

                Filesize

                307B

                MD5

                55519228ebc2976b4e83381f66ce9111

                SHA1

                df0852f2a784f975f9ee6d52b4d2f76ddcee8b25

                SHA256

                79dd89dd960a9a135044276fe4dbe3cd38aa8d136334e8cfaed070c6de3327ec

                SHA512

                b472c07420007c027794ff70c8b1c4da413584d1aabeb0e88f45efc4dc998dd56cbae277b1435c2cad9e56197ea3e512cb382d884ab16f88e69db466a3a954c0

              • C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe

                Filesize

                305KB

                MD5

                cd66a65a443099ac4a999a9ab78dea65

                SHA1

                ae54fe986856d236819b6199a8478ea4497fc0f1

                SHA256

                529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d

                SHA512

                ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1

              • C:\Users\Admin\AppData\Roaming\Oxofx\jygut.exe

                Filesize

                305KB

                MD5

                cd66a65a443099ac4a999a9ab78dea65

                SHA1

                ae54fe986856d236819b6199a8478ea4497fc0f1

                SHA256

                529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d

                SHA512

                ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1

              • \Users\Admin\AppData\Roaming\Oxofx\jygut.exe

                Filesize

                305KB

                MD5

                cd66a65a443099ac4a999a9ab78dea65

                SHA1

                ae54fe986856d236819b6199a8478ea4497fc0f1

                SHA256

                529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d

                SHA512

                ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1

              • \Users\Admin\AppData\Roaming\Oxofx\jygut.exe

                Filesize

                305KB

                MD5

                cd66a65a443099ac4a999a9ab78dea65

                SHA1

                ae54fe986856d236819b6199a8478ea4497fc0f1

                SHA256

                529b30a0e6536221411d0010cb1eb2079583f094b2641d040d9be18edfdf185d

                SHA512

                ea10911e4e5c4a44678c884f17c099efed77ae12e32fea31bf06a42c9d7989ec08374c0daf3d2e8eeae780920e6d2fc978bc1c682e42df9c1df2e302b2928bb1

              • memory/992-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-112-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-114-0x0000000000050000-0x0000000000098000-memory.dmp

                Filesize

                288KB

              • memory/992-98-0x0000000000050000-0x0000000000098000-memory.dmp

                Filesize

                288KB

              • memory/992-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/992-102-0x0000000000050000-0x0000000000098000-memory.dmp

                Filesize

                288KB

              • memory/992-101-0x0000000000050000-0x0000000000098000-memory.dmp

                Filesize

                288KB

              • memory/992-100-0x0000000000050000-0x0000000000098000-memory.dmp

                Filesize

                288KB

              • memory/1116-69-0x0000000001CA0000-0x0000000001CE8000-memory.dmp

                Filesize

                288KB

              • memory/1116-70-0x0000000001CA0000-0x0000000001CE8000-memory.dmp

                Filesize

                288KB

              • memory/1116-68-0x0000000001CA0000-0x0000000001CE8000-memory.dmp

                Filesize

                288KB

              • memory/1116-67-0x0000000001CA0000-0x0000000001CE8000-memory.dmp

                Filesize

                288KB

              • memory/1116-65-0x0000000001CA0000-0x0000000001CE8000-memory.dmp

                Filesize

                288KB

              • memory/1180-73-0x0000000001BA0000-0x0000000001BE8000-memory.dmp

                Filesize

                288KB

              • memory/1180-74-0x0000000001BA0000-0x0000000001BE8000-memory.dmp

                Filesize

                288KB

              • memory/1180-75-0x0000000001BA0000-0x0000000001BE8000-memory.dmp

                Filesize

                288KB

              • memory/1180-76-0x0000000001BA0000-0x0000000001BE8000-memory.dmp

                Filesize

                288KB

              • memory/1236-82-0x0000000002A70000-0x0000000002AB8000-memory.dmp

                Filesize

                288KB

              • memory/1236-80-0x0000000002A70000-0x0000000002AB8000-memory.dmp

                Filesize

                288KB

              • memory/1236-81-0x0000000002A70000-0x0000000002AB8000-memory.dmp

                Filesize

                288KB

              • memory/1236-79-0x0000000002A70000-0x0000000002AB8000-memory.dmp

                Filesize

                288KB

              • memory/1752-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-104-0x00000000004F0000-0x0000000000538000-memory.dmp

                Filesize

                288KB

              • memory/1752-91-0x00000000004F0000-0x0000000000542000-memory.dmp

                Filesize

                328KB

              • memory/1752-95-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1752-54-0x0000000000400000-0x0000000000452000-memory.dmp

                Filesize

                328KB

              • memory/1752-88-0x00000000004F0000-0x0000000000538000-memory.dmp

                Filesize

                288KB

              • memory/1752-87-0x00000000004F0000-0x0000000000538000-memory.dmp

                Filesize

                288KB

              • memory/1752-86-0x00000000004F0000-0x0000000000538000-memory.dmp

                Filesize

                288KB

              • memory/1752-85-0x00000000004F0000-0x0000000000538000-memory.dmp

                Filesize

                288KB

              • memory/1752-55-0x0000000000401000-0x0000000000441000-memory.dmp

                Filesize

                256KB

              • memory/1752-56-0x0000000075111000-0x0000000075113000-memory.dmp

                Filesize

                8KB