Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 16:20

General

  • Target

    8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049.exe

  • Size

    25KB

  • MD5

    5b8d17261ce0bb93804c245169eeff30

  • SHA1

    c866d739b1e97502d6f1d5586b9a5d7169765c8a

  • SHA256

    8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

  • SHA512

    fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

  • SSDEEP

    768:FqbKI+C2pbyw15X/WllPlqZrpvUAwiiuP:GKI+C2pWw1kzNq7Myiu

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049.exe
    "C:\Users\Admin\AppData\Local\Temp\8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\wbem\csrss.exe
      C:\Windows\system32\wbem\csrss.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
        3⤵
          PID:1932
        • C:\Windows\SysWOW64\wbem\csrss.exe
          C:\Windows\system32\wbem\csrss.exe
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          PID:1756
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\temp.bat
        2⤵
        • Deletes itself
        PID:1908
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1132
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:596

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\temp.bat

            Filesize

            160B

            MD5

            688de2c11d07cd1a0f0a22aaba2f38fe

            SHA1

            c693ee247172adf49b1fe68c597358b0e0e2477e

            SHA256

            8fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7

            SHA512

            d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a

          • C:\Users\Admin\AppData\Local\Temp\temp.bat

            Filesize

            296B

            MD5

            2b3e740db24baa70768404aa35da54ca

            SHA1

            1bed04afb1768d6265ab430fbfd0e9d123ef5ce4

            SHA256

            dec525cfc0cf1ca4c903fafd4506b4fbc446482f7382e1d079a24c52602ea2f3

            SHA512

            d98b1f30ea766b8266806dd49886779e8a3011874a08b2fe8e86ca682c237024afacdf5d87d02b4b8475508e5df8d719c3a4dfe298935eee718eb5bea54b9731

          • C:\Users\Admin\AppData\Local\n.ini

            Filesize

            19B

            MD5

            e415f059d8566da0d8d44108e0e915fe

            SHA1

            34dff1c646f465308c2804f0f046bbdcdfb53661

            SHA256

            b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

            SHA512

            fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

          • C:\Users\Admin\AppData\Local\n.ini

            Filesize

            19B

            MD5

            e415f059d8566da0d8d44108e0e915fe

            SHA1

            34dff1c646f465308c2804f0f046bbdcdfb53661

            SHA256

            b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

            SHA512

            fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CND04U3G.txt

            Filesize

            608B

            MD5

            b597fe28abfd3e1ec7f8a10d342b5cdd

            SHA1

            3735ba3a74d9b531948d4ff8059c3e4c667c8704

            SHA256

            3e1b9dc77ca7b2f8713b2835cc20e356f3c1c7d76a52a3fc212cf5c2b4f77049

            SHA512

            b62b6dad801bb57d2e236810814323d604958e875fb075c300bb6e167ceba20b51e2cdcda968bfac58c23a7380880523660963ffee76f195becc42516bd01265

          • C:\Windows\SysWOW64\n.ini

            Filesize

            19B

            MD5

            e415f059d8566da0d8d44108e0e915fe

            SHA1

            34dff1c646f465308c2804f0f046bbdcdfb53661

            SHA256

            b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

            SHA512

            fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

          • C:\Windows\SysWOW64\n.ini

            Filesize

            19B

            MD5

            e415f059d8566da0d8d44108e0e915fe

            SHA1

            34dff1c646f465308c2804f0f046bbdcdfb53661

            SHA256

            b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

            SHA512

            fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

          • C:\Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • C:\Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • C:\Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • \Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • \Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • \Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • \Windows\SysWOW64\wbem\csrss.exe

            Filesize

            25KB

            MD5

            5b8d17261ce0bb93804c245169eeff30

            SHA1

            c866d739b1e97502d6f1d5586b9a5d7169765c8a

            SHA256

            8192dddb9838883d396373636d0cb255ff82636939fc7ca0fa78a87ba355f049

            SHA512

            fec1d1959bb7a62adbd80d35e61a143a21adeb36f4cab9c73e08dbf4762bffe3afb89fc44e38d08ac48f56c4e074060b2206d8749b8c842ef81315599fd6d68e

          • memory/1756-77-0x0000000006000000-0x0000000006012000-memory.dmp

            Filesize

            72KB

          • memory/1964-65-0x0000000006000000-0x0000000006012000-memory.dmp

            Filesize

            72KB

          • memory/1964-75-0x0000000006000000-0x0000000006012000-memory.dmp

            Filesize

            72KB

          • memory/1980-63-0x0000000006000000-0x0000000006012000-memory.dmp

            Filesize

            72KB

          • memory/1980-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

            Filesize

            8KB

          • memory/1980-55-0x0000000006000000-0x0000000006012000-memory.dmp

            Filesize

            72KB