Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 05:40

General

  • Target

    c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe

  • Size

    132KB

  • MD5

    6aea36d71ad1b2233ee7bcbc56da372c

  • SHA1

    fea9859246847b749b7c1a94288c8e0555a5c07c

  • SHA256

    c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30

  • SHA512

    bf9bcea0a3ff69de1c6e63a4ba0f14e934fd9b71e1aeedec60f6c29d0dbe5c9ceb324cc0a4218bde97142120808493e2830fd0deed8e4bfd8d01bf188c45d317

  • SSDEEP

    3072:dymaiGujNQyxJJfShIf0KKUOf8IKaLliSiEVsHA:Qm/j7B+cHOyaL1iA

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe
      C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c0d5dfe74e781d36d80d9292cb065c0a42beb3b4fb683dc1edefb34691b1ea30.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1820
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1256
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:796
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1388-62-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1388-63-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1388-58-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1388-57-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1388-54-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1388-72-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB