Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 17:22

General

  • Target

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe

  • Size

    1.1MB

  • MD5

    76129308241ae5ac4d200214b352f7d0

  • SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

  • SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

  • SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • SSDEEP

    24576:YR/cLzx3RgD5mXegr4R0ejdwFTP2hTfqYT1+jM34mPL/fiWMtdsPg:e/c53RgD5mOdRTOShTfq4/34OniWMt

Score
10/10

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Drops file in Windows directory 22 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe
    "C:\Users\Admin\AppData\Local\Temp\fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe
      "C:\Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\hogqjuckdi.exe
        "C:\Windows\hogqjuckdi.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4872
  • C:\Windows\hogqjuckdi.exe
    C:\Windows\hogqjuckdi.exe
    1⤵
    • Windows security bypass
    • Executes dropped EXE
    • Loads dropped DLL
    • Windows security modification
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\kwatdsqcwjn.exe
      WATCHDOGPROC "c:\windows\hogqjuckdi.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2464
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall set opmode disable
      2⤵
      • Modifies Windows Firewall
      • Modifies data under HKEY_USERS
      PID:4808
    • C:\Windows\TEMP\qgwclb48a29fu.exe
      C:\Windows\TEMP\qgwclb48a29fu.exe -r 51412 tcp
      2⤵
      • Executes dropped EXE
      PID:2928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • C:\Windows\Temp\qgwclb48a29fu.exe

    Filesize

    34KB

    MD5

    476f447617f65eebf35c52d4fd3b3188

    SHA1

    179ee6e698803a45be916f107638f01d553d6e65

    SHA256

    a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

    SHA512

    37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

  • C:\Windows\hogqjuckdi.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • C:\Windows\hogqjuckdi.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • C:\Windows\kwatdsqcwjn.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • C:\Windows\lvwfaezgrypl\etc

    Filesize

    10B

    MD5

    f88afa0fa241403dfd98c4a821363068

    SHA1

    51222887163b34f02dc35eaffbb127940b44ec91

    SHA256

    3ec913f1de6e549c24261b68f8623fcd609afcc301985d231414cbaa09e2b55e

    SHA512

    e836a09cab1a5d9663da898b1a23f322dfae5244ec88282b7135b2c7fda47682cf490b0bac3a1fc7555b931bfc1f12a5892ee7dedc2c9238b45e9b86ff56814b

  • C:\Windows\lvwfaezgrypl\rng

    Filesize

    4B

    MD5

    40497c86020084c2bbf5445cd18d597a

    SHA1

    bd3e974b3c0619c84b98c0be0aabf91f4101bc64

    SHA256

    95289b2dda0e64fd15afd08d382f6af6a1cf08d74d1dc4e3b607d8ca89f23760

    SHA512

    b2d5bbd49a298259676b4ea9f0fa318f1286aac256ff69250d17a9ed96519ad564be1edd5d4f805e5f60d1fad1249c64f1491e9c2b1d19387220d646cf286779

  • C:\Windows\lvwfaezgrypl\tst

    Filesize

    10B

    MD5

    d9e0d258df86c6859951b803fa0e539c

    SHA1

    d04df79fdffa92605bdc478f4247fa2b55fceb7f

    SHA256

    e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

    SHA512

    8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

  • C:\Windows\lvwfaezgrypl\tst

    Filesize

    10B

    MD5

    d9e0d258df86c6859951b803fa0e539c

    SHA1

    d04df79fdffa92605bdc478f4247fa2b55fceb7f

    SHA256

    e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

    SHA512

    8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

  • C:\Windows\lvwfaezgrypl\tst

    Filesize

    10B

    MD5

    d9e0d258df86c6859951b803fa0e539c

    SHA1

    d04df79fdffa92605bdc478f4247fa2b55fceb7f

    SHA256

    e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

    SHA512

    8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

  • C:\Windows\lvwfaezgrypl\tst

    Filesize

    10B

    MD5

    d9e0d258df86c6859951b803fa0e539c

    SHA1

    d04df79fdffa92605bdc478f4247fa2b55fceb7f

    SHA256

    e71eb9e1b484bed5dc20e32acf079f979aec46863078331771912423e08b564e

    SHA512

    8c0dbe178f6769dac6573afea6ad1c4b3caa2443276abbcbe6cecc4698b88174963a83ad4952966526c25548b2f266dddb800d0b778b8f76327367aa7562537e

  • \??\c:\users\admin\appdata\local\temp\qgwclb481o8fuocazl5j9.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • \??\c:\windows\hogqjuckdi.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • \Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • \Users\Admin\AppData\Local\Temp\qgwclb481o8fuocazl5j9.exe

    Filesize

    1.1MB

    MD5

    76129308241ae5ac4d200214b352f7d0

    SHA1

    ff30e79e82082092ae9a174d0682e60bf30f3fb6

    SHA256

    fa18d2a83fba7fff81ff840a625522c79b123147ea7fd4ce76d86cd6b59f0df7

    SHA512

    ccb274f735b3e022dc6fc7c4660b9bdd495cc90526673f5a4d0dda71beadd764a7626e45499fb1815fd759d25b8389a5092b680fe019011a37461838de5def2b

  • \Windows\Temp\qgwclb48a29fu.exe

    Filesize

    34KB

    MD5

    476f447617f65eebf35c52d4fd3b3188

    SHA1

    179ee6e698803a45be916f107638f01d553d6e65

    SHA256

    a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

    SHA512

    37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

  • \Windows\Temp\qgwclb48a29fu.exe

    Filesize

    34KB

    MD5

    476f447617f65eebf35c52d4fd3b3188

    SHA1

    179ee6e698803a45be916f107638f01d553d6e65

    SHA256

    a8c7fd29a25658f115213c3516dd8f77d44d42c40f9348996443e593d878dcf0

    SHA512

    37c51cb92a2adaa3fdb70ae41c95f5499e25cc772020d6c701ef9ce157320017ae207896dcc0e27b9841d0b7890a8b37440bff6dfa0468dc01f72275d4c820f9

  • memory/2464-64-0x0000000000000000-mapping.dmp

  • memory/2568-56-0x0000000000000000-mapping.dmp

  • memory/2928-75-0x0000000000000000-mapping.dmp

  • memory/3664-66-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB

  • memory/4808-67-0x0000000000000000-mapping.dmp

  • memory/4872-71-0x0000000000000000-mapping.dmp