Analysis

  • max time kernel
    153s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 07:25

General

  • Target

    7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe

  • Size

    299KB

  • MD5

    7cdfddba8f4c3146ba1b23e007817d90

  • SHA1

    3871c87b9ebebc84acac734a05e448995a148fdf

  • SHA256

    7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0

  • SHA512

    e1e1b5ba0df52f4726f6cbc7824947811c22493e8f49f1e80b44589879e0c5ccc52596025927213cb34f6b5489dcb1d11700574e2d8f36f95fd5cbf64d9a3c31

  • SSDEEP

    6144:UTQigjOeD798+kcwXB5Fa94Be2kbMVgC4NLvBb79savmHXP:UTQJjz98+6fBe2kYVgxFmHXP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1232
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1360
        • C:\Users\Admin\AppData\Local\Temp\7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe
          "C:\Users\Admin\AppData\Local\Temp\7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:784
          • C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe
            "C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1984
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HCP992F.bat"
            3⤵
            • Deletes itself
            PID:660
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1312

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\HCP992F.bat

          Filesize

          303B

          MD5

          44f1aefc17dcd09fb27c12a8e07fbcaf

          SHA1

          8e50498a6fb0739d8bdb6b360a1b0c03d40a4d83

          SHA256

          5cdd166e2f29924c7a15a6c0af04cf8bcf0df2c35bc37c9e5632e58dcd216e81

          SHA512

          68deb158a4998f326a14fdd77f8f07f974fb3303124115b6d831f0dada93dd5b7e23650665298ebed4872febb0a7406848bbc04bca7befb905cb01716df65155

        • C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe

          Filesize

          299KB

          MD5

          6ed89166b822f17f88d2734c12cc993e

          SHA1

          0f6d2721ce6760fd7c44ba25a9b4f0e266de2be6

          SHA256

          dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d

          SHA512

          a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02

        • C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe

          Filesize

          299KB

          MD5

          6ed89166b822f17f88d2734c12cc993e

          SHA1

          0f6d2721ce6760fd7c44ba25a9b4f0e266de2be6

          SHA256

          dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d

          SHA512

          a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02

        • \Users\Admin\AppData\Roaming\Alolli\meiqg.exe

          Filesize

          299KB

          MD5

          6ed89166b822f17f88d2734c12cc993e

          SHA1

          0f6d2721ce6760fd7c44ba25a9b4f0e266de2be6

          SHA256

          dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d

          SHA512

          a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02

        • \Users\Admin\AppData\Roaming\Alolli\meiqg.exe

          Filesize

          299KB

          MD5

          6ed89166b822f17f88d2734c12cc993e

          SHA1

          0f6d2721ce6760fd7c44ba25a9b4f0e266de2be6

          SHA256

          dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d

          SHA512

          a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02

        • memory/660-112-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-115-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/660-98-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/660-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-113-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/660-106-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/660-102-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/660-100-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/660-101-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/784-87-0x0000000001ED0000-0x0000000001F18000-memory.dmp

          Filesize

          288KB

        • memory/784-104-0x0000000001ED0000-0x0000000001F18000-memory.dmp

          Filesize

          288KB

        • memory/784-55-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/784-85-0x0000000001ED0000-0x0000000001F18000-memory.dmp

          Filesize

          288KB

        • memory/784-86-0x0000000001ED0000-0x0000000001F18000-memory.dmp

          Filesize

          288KB

        • memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

          Filesize

          8KB

        • memory/784-88-0x0000000001ED0000-0x0000000001F18000-memory.dmp

          Filesize

          288KB

        • memory/784-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-91-0x0000000001ED0000-0x0000000001F1F000-memory.dmp

          Filesize

          316KB

        • memory/784-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-95-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/784-56-0x0000000000401000-0x0000000000441000-memory.dmp

          Filesize

          256KB

        • memory/1232-69-0x0000000001C70000-0x0000000001CB8000-memory.dmp

          Filesize

          288KB

        • memory/1232-70-0x0000000001C70000-0x0000000001CB8000-memory.dmp

          Filesize

          288KB

        • memory/1232-65-0x0000000001C70000-0x0000000001CB8000-memory.dmp

          Filesize

          288KB

        • memory/1232-67-0x0000000001C70000-0x0000000001CB8000-memory.dmp

          Filesize

          288KB

        • memory/1232-68-0x0000000001C70000-0x0000000001CB8000-memory.dmp

          Filesize

          288KB

        • memory/1312-74-0x0000000001AC0000-0x0000000001B08000-memory.dmp

          Filesize

          288KB

        • memory/1312-73-0x0000000001AC0000-0x0000000001B08000-memory.dmp

          Filesize

          288KB

        • memory/1312-76-0x0000000001AC0000-0x0000000001B08000-memory.dmp

          Filesize

          288KB

        • memory/1312-75-0x0000000001AC0000-0x0000000001B08000-memory.dmp

          Filesize

          288KB

        • memory/1360-81-0x00000000026E0000-0x0000000002728000-memory.dmp

          Filesize

          288KB

        • memory/1360-79-0x00000000026E0000-0x0000000002728000-memory.dmp

          Filesize

          288KB

        • memory/1360-80-0x00000000026E0000-0x0000000002728000-memory.dmp

          Filesize

          288KB

        • memory/1360-82-0x00000000026E0000-0x0000000002728000-memory.dmp

          Filesize

          288KB

        • memory/1984-63-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB