Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 12:11

General

  • Target

    7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96.exe

  • Size

    140KB

  • MD5

    2de33e1553cf632642a619e8324d0a80

  • SHA1

    4031f0f6649175f28dd62bea66aadf673552a6d2

  • SHA256

    7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96

  • SHA512

    7d4efbe6963033bf6f0686b889e03c1bbd572f0cbbcc47e95b381db01ce96d708c2f702ee5428e83cd94887990706fd7e69969db103583060defed6dce341ca0

  • SSDEEP

    1536:In0/Oi125oR/9tQjboK/5SD1f946Zdm/R+K+ZVAs8YUmPiw16:I0/eoR/9tQjbL/5013LaR+Bx6w16

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96.exe
    "C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96mgr.exe
      C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96mgr.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Program Files (x86)\Microsoft\WaterMark.exe
        "C:\Program Files (x86)\Microsoft\WaterMark.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
            PID:3380
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 208
              5⤵
              • Program crash
              PID:4040
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2292
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3820
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3380 -ip 3380
      1⤵
        PID:212

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        96KB

        MD5

        ba3834e01e80c0c7e7b81e4721457aa7

        SHA1

        d876efa57dd896435dbe3675cdcbd1c182803990

        SHA256

        d04ef80eeae507cbca299a8027a84322b86ca909e73182966639321aba635596

        SHA512

        3657e78e3c2d2b00d522f63eca33e6dd378904170e3a501e20fe431bbee24dfa1b39186e8a867143dbef59385a03740f4c3c4da558ab2275e28ef56f20e7530c

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        96KB

        MD5

        ba3834e01e80c0c7e7b81e4721457aa7

        SHA1

        d876efa57dd896435dbe3675cdcbd1c182803990

        SHA256

        d04ef80eeae507cbca299a8027a84322b86ca909e73182966639321aba635596

        SHA512

        3657e78e3c2d2b00d522f63eca33e6dd378904170e3a501e20fe431bbee24dfa1b39186e8a867143dbef59385a03740f4c3c4da558ab2275e28ef56f20e7530c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        7de3527d962389a61a0825bebf9031b7

        SHA1

        ffc04b363ec1d3976e454446827d36813002a9b7

        SHA256

        63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

        SHA512

        57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        7de3527d962389a61a0825bebf9031b7

        SHA1

        ffc04b363ec1d3976e454446827d36813002a9b7

        SHA256

        63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

        SHA512

        57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        8df54c1c34cdc9e85acf6c6fc1aa6c65

        SHA1

        0e12684c4b2bc3740bde66cf17fd13bec837851c

        SHA256

        eecddde4ea647ac5e5627fff5ee282a5032cd193e1f8091bd1b6f074196b10b6

        SHA512

        d22e865a9d506695acb6c2ce9db131ae35dd96f9097e2d364ce318ff5aa4baaecfa03334977b5fe7ee353e3f24918b17fafa252f106206d1c316a91cf00de9fb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        7290a722b0bfc86e61fb5131efb25401

        SHA1

        0499ce27af507b1454897f38db0ee6cfc8c07654

        SHA256

        19d01ca38a365c4ac25aec1cbbc673215b484e4a198d07cc57fc7126f665d2f7

        SHA512

        b2d152dd5ad4fcdf9742b048788a81bd03e37a665878949b9a946de5629d2c78d3e07960fd43ffadd20bf0aa085f02ece4aeaefc0003fe50f8b8484b3258cd3a

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2FED98B8-498C-11ED-A0EE-C243EF799EB6}.dat

        Filesize

        5KB

        MD5

        719e0a9ec6ec3754af4049c961b4b299

        SHA1

        2f3557af05b651707b922f300bc01e54c0a7e0bf

        SHA256

        295e09637a111f0b267829bb0d7c2d025a5c3c7f426440f84b96eb86ed2a14df

        SHA512

        cef3dd3a5ad6d2f473d995599b428f14c64be0c1d680291d3f565e28e521e2dff12f2956fd9820d836963dbe4f71ab689a3adf85de1d55ce0d3ce23b2f5a043f

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2FF983CD-498C-11ED-A0EE-C243EF799EB6}.dat

        Filesize

        5KB

        MD5

        f223497c7f71c1fd3c5a7b59cd6cf700

        SHA1

        e5a6428ab17a28bd049571fdaccfc86e579448e6

        SHA256

        ca4cb10b067bf52749e539569bd44ca846c018c229383d9d0262a452215aff0e

        SHA512

        a3103dec0e6df18736f7e68b98c488cf904ab5e5451a1a2dd1e3ec1784fee45bd7c0c579d2e558679127fb5558abca76416b1f61e0f4736104c0b917f13e6c5e

      • C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96mgr.exe

        Filesize

        96KB

        MD5

        ba3834e01e80c0c7e7b81e4721457aa7

        SHA1

        d876efa57dd896435dbe3675cdcbd1c182803990

        SHA256

        d04ef80eeae507cbca299a8027a84322b86ca909e73182966639321aba635596

        SHA512

        3657e78e3c2d2b00d522f63eca33e6dd378904170e3a501e20fe431bbee24dfa1b39186e8a867143dbef59385a03740f4c3c4da558ab2275e28ef56f20e7530c

      • C:\Users\Admin\AppData\Local\Temp\7d47510065094ec5d75929e7496539c935fbedc18b9062e9d7158760896d9d96mgr.exe

        Filesize

        96KB

        MD5

        ba3834e01e80c0c7e7b81e4721457aa7

        SHA1

        d876efa57dd896435dbe3675cdcbd1c182803990

        SHA256

        d04ef80eeae507cbca299a8027a84322b86ca909e73182966639321aba635596

        SHA512

        3657e78e3c2d2b00d522f63eca33e6dd378904170e3a501e20fe431bbee24dfa1b39186e8a867143dbef59385a03740f4c3c4da558ab2275e28ef56f20e7530c

      • memory/2064-148-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/2064-145-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2064-141-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/2064-140-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/2064-144-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2064-142-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2064-143-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/2296-133-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/2296-137-0x0000000000400000-0x0000000000423000-memory.dmp

        Filesize

        140KB

      • memory/4896-159-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-162-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-163-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-164-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-165-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-166-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4896-158-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-157-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/4896-156-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB