Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 23:48

General

  • Target

    http://179.43.175.5/bins

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://179.43.175.5/bins
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3188 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4968
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4692
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\arm4"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1132
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\arm4
        2⤵
          PID:4376

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
        Filesize

        1KB

        MD5

        65598298436b077efc371b472fa4a917

        SHA1

        ccd884108f8e0ec2eb64cc26bec6aaf2e8e6d027

        SHA256

        4e2f4de0574da8b50fafb1cdc27188edbd7dee38f032a25e247270adc0a8d43e

        SHA512

        99b62106ad3a422ee4889d3e59e6ffd4974d6629074ea204b00317a3da66917fc0ac868a7e6afd4827fde5f6e5396794e66122c342028c46805512c71153ff46

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        471B

        MD5

        7de3527d962389a61a0825bebf9031b7

        SHA1

        ffc04b363ec1d3976e454446827d36813002a9b7

        SHA256

        63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

        SHA512

        57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
        Filesize

        446B

        MD5

        3cd7bd252f2dfab729f9841d8365c767

        SHA1

        e30049773d25034015143ae2e9bd0b67b8da5118

        SHA256

        2dbaece50d81f1e387a5af62194fd9835b32bb86717802de4acc3c29b7973f4e

        SHA512

        4f40a6e03ac945742133da3910c05c38205bcf4f426e3a5071cdfa6efaf4f4c03847cbb9efd0f65c9a6632a9b939666ae4898a0e002dff72c21c9d3fe1956010

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        434B

        MD5

        8254bb349aed8c9b7479bc46a3940e83

        SHA1

        2b309690bf7d0796605d7c1068a08a396b1e2af9

        SHA256

        80f37d94d5d1292c9e5d931c43ac820343894d41c41ac8283d1b23663aa1e46d

        SHA512

        0ce38c7a571764ffa50d526ff8f259e4c11d99ae2a2268918fb9154d51c54126148f5131954287fbc175f76f571f002c7004b0178070ac5b647444028d76d027

      • C:\Users\Admin\Downloads\arm4.tawpa99.partial
        Filesize

        54KB

        MD5

        a7f21fbdd2ad12a7f8f9712546c16b5c

        SHA1

        46872d54ae1332e814521ac21338aba4d9047377

        SHA256

        8bebece9918b16f64751467babcd45ff11aad3087f97b8d7ef693e1b278f8d2d

        SHA512

        3692e1e44a380e8a8368392cdecd845f2edcf2d755720262d4727a1c407fea5426b1813be15db7fd302ec0dd766d2a4323e157806170c07580adc57630004761

      • memory/4376-135-0x0000000000000000-mapping.dmp