Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 07:59

General

  • Target

    3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe

  • Size

    834KB

  • MD5

    5bae3e4a5dc8a9f4196e25682e2717d0

  • SHA1

    38288154296e2efd3beb4c4775809200b87ffb80

  • SHA256

    3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

  • SHA512

    3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

  • SSDEEP

    24576:VsO5HqwFQcggPtwr/Rhzhyti5nj7xlUKmPoWC6hZd7:RALVyO7xmTw6N

Score
10/10

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Drops file in Windows directory 22 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe
    "C:\Users\Admin\AppData\Local\Temp\3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe
      "C:\Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\mrdjsqxkng.exe
        "C:\Windows\mrdjsqxkng.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2268
  • C:\Windows\mrdjsqxkng.exe
    C:\Windows\mrdjsqxkng.exe
    1⤵
    • Windows security bypass
    • Executes dropped EXE
    • Loads dropped DLL
    • Windows security modification
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\gfaaboswn.exe
      WATCHDOGPROC "c:\windows\mrdjsqxkng.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:4024
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall set opmode disable
      2⤵
      • Modifies Windows Firewall
      • Modifies data under HKEY_USERS
      PID:2140
    • C:\Windows\TEMP\ztpzpa47z7tjj4hz.exe
      C:\Windows\TEMP\ztpzpa47z7tjj4hz.exe -r 31417 tcp
      2⤵
      • Executes dropped EXE
      PID:3008

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • C:\Windows\Temp\ztpzpa47z7tjj4hz.exe

          Filesize

          34KB

          MD5

          476f447617f65eebf35c52d4fd3b3188

          SHA1

          179ee6e698803a45be916f107638f01d553d6e65

          SHA256

          a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

          SHA512

          37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

        • C:\Windows\gfaaboswn.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • C:\Windows\mrdjsqxkng.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • C:\Windows\mrdjsqxkng.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • C:\Windows\qjlugngmmagmh\etc

          Filesize

          10B

          MD5

          f88afa0fa241403dfd98c4a821363068

          SHA1

          51222887163b34f02dc35eaffbb127940b44ec91

          SHA256

          3ec913f1de6e549c24261b68f8623fcd609afcc301985d231414cbaa09e2b55e

          SHA512

          e836a09cab1a5d9663da898b1a23f322dfae5244ec88282b7135b2c7fda47682cf490b0bac3a1fc7555b931bfc1f12a5892ee7dedc2c9238b45e9b86ff56814b

        • C:\Windows\qjlugngmmagmh\rng

          Filesize

          4B

          MD5

          3bf81e2bf6dc61706efb9a6dadc5793a

          SHA1

          bf1bbfb3b5aaddbc5065b8440ea616d84fad8ff2

          SHA256

          961ae28829f0b1cfbd073eff070ac5ea8994618c0e84fab4764367464a14b854

          SHA512

          354f74cb52f314226a6021c5745799d05a0c8ba21246c9717b8ce211193603c4704b72332f80576d15b14d76c8f772cd5b6fa7a10acb60fab67411573f732b1c

        • C:\Windows\qjlugngmmagmh\tst

          Filesize

          10B

          MD5

          d9e0d258df86c6859951b803fa0e539c

          SHA1

          d04df79fdffa92605bdc478f4247fa2b55fceb7f

          SHA256

          e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

          SHA512

          8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

        • C:\Windows\qjlugngmmagmh\tst

          Filesize

          10B

          MD5

          d9e0d258df86c6859951b803fa0e539c

          SHA1

          d04df79fdffa92605bdc478f4247fa2b55fceb7f

          SHA256

          e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

          SHA512

          8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

        • C:\Windows\qjlugngmmagmh\tst

          Filesize

          10B

          MD5

          d9e0d258df86c6859951b803fa0e539c

          SHA1

          d04df79fdffa92605bdc478f4247fa2b55fceb7f

          SHA256

          e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

          SHA512

          8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

        • \??\c:\users\admin\appdata\local\temp\ztpzpa47w6mjj4hzjbtvqf.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • \??\c:\windows\mrdjsqxkng.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • \Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • \Users\Admin\AppData\Local\Temp\ztpzpa47w6mjj4hzjbtvqf.exe

          Filesize

          834KB

          MD5

          5bae3e4a5dc8a9f4196e25682e2717d0

          SHA1

          38288154296e2efd3beb4c4775809200b87ffb80

          SHA256

          3c6b660918a24a62772fe016ec4531ec8750e6b8f9195d5c4bf902868c9a87f0

          SHA512

          3ba0f2fd9de6c9eaea94640bf67816c4a914460a69578ff3bd3c84db0e88753aed367695809c71958953352e52a17f3ad8702a99482a023bd3425acf419cba2a

        • \Windows\Temp\ztpzpa47z7tjj4hz.exe

          Filesize

          34KB

          MD5

          476f447617f65eebf35c52d4fd3b3188

          SHA1

          179ee6e698803a45be916f107638f01d553d6e65

          SHA256

          a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

          SHA512

          37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

        • \Windows\Temp\ztpzpa47z7tjj4hz.exe

          Filesize

          34KB

          MD5

          476f447617f65eebf35c52d4fd3b3188

          SHA1

          179ee6e698803a45be916f107638f01d553d6e65

          SHA256

          a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

          SHA512

          37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

        • memory/3152-66-0x00000000758B1000-0x00000000758B3000-memory.dmp

          Filesize

          8KB