Analysis

  • max time kernel
    147s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 18:28

General

  • Target

    734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe

  • Size

    139KB

  • MD5

    6db05eaa57b8fe2cf1571c82961907a6

  • SHA1

    34ba14425af541e3ec6919bc91eeed07678a7752

  • SHA256

    734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea

  • SHA512

    cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd

  • SSDEEP

    3072:8nxwgxgfR/DVG7wBpEsNDj4AYK66VklRJ:A+xDVG0BpV3o6VkDJ

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe
    "C:\Users\Admin\AppData\Local\Temp\734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:3488
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 204
            4⤵
            • Program crash
            PID:2032
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4080
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4080 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:220
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:240
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3488 -ip 3488
      1⤵
        PID:4368

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        139KB

        MD5

        6db05eaa57b8fe2cf1571c82961907a6

        SHA1

        34ba14425af541e3ec6919bc91eeed07678a7752

        SHA256

        734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea

        SHA512

        cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        139KB

        MD5

        6db05eaa57b8fe2cf1571c82961907a6

        SHA1

        34ba14425af541e3ec6919bc91eeed07678a7752

        SHA256

        734fb4f53d07350313ccde0b366f37dce5f4bc4a7fffeb173d13a9b54d3a2fea

        SHA512

        cb3c575f94a04b65c292984e0f0a2c8cd2542f9519d3ac52270f71a0671f981bd02cdc04db605241ceb7c96284f6b7bb325030d3a5861e44dcf0199a6f09d5bd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        957d711ef13aae49d723c4d2b1d4fa37

        SHA1

        aa818a5cfb5ce97987c05c8f20866cbbafb4bf93

        SHA256

        43184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b

        SHA512

        f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        957d711ef13aae49d723c4d2b1d4fa37

        SHA1

        aa818a5cfb5ce97987c05c8f20866cbbafb4bf93

        SHA256

        43184ac9a857febd19b97a04797528a7de0c15744ae3d540e23cc4b5f1d2641b

        SHA512

        f5c8fb180bba40d0755c909349bb960be5b8242de651237b9c2368d74accbf845f3cad131ff9b80f71745353dd11b53ddda7fd5cb928a2f543be217b9e975030

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        f262551155e39439fa6103a6366a6ca0

        SHA1

        25685b0330973ee4a6f4906337858154f4ec59b4

        SHA256

        9093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d

        SHA512

        ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        f262551155e39439fa6103a6366a6ca0

        SHA1

        25685b0330973ee4a6f4906337858154f4ec59b4

        SHA256

        9093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d

        SHA512

        ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        f262551155e39439fa6103a6366a6ca0

        SHA1

        25685b0330973ee4a6f4906337858154f4ec59b4

        SHA256

        9093606d9f99769d03112f1d284bde232a0c001cc4f1c5e04ea70ebb7a87d44d

        SHA512

        ef01bf75938c412225e8e5ee379b25ab24d5dbb6a6cac2fc35ddc367995d4482b62b5c374a5808ce8c4542208f0512555f6c77fec51882aa4452df0defcfb75c

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2607F453-4A83-11ED-B696-DEF0885D2AEB}.dat

        Filesize

        5KB

        MD5

        591f45011ce9cf7799e23d50843ac122

        SHA1

        be7b94300de17c9d0abc9d946f83b27e37599325

        SHA256

        17a954203e1ba03199198e8575a7e1ad5bbdcd3d5d99fc12400eeb87ccd1d6f3

        SHA512

        b049e3cba8bef611eba5e0cf70415f5930f71f415ff26376e8ce9e251f11eb4af99aeac7bb25375f97cea190227d786f7b808743912cbae81a90c4d5dcc47582

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{26081B63-4A83-11ED-B696-DEF0885D2AEB}.dat

        Filesize

        5KB

        MD5

        a08698e3ddbe57600b1e68adb7169791

        SHA1

        74b3268443698e1cf48a09f715596a985807e3dc

        SHA256

        4422970d06679586859bf86d0db9fabfd0de1ae5ed9ec2d094a2bc2dd91ab3f5

        SHA512

        004013e562d12b0f6a8fb890433ac4db262c00c38efa53296df5a96e6ea01a1dd1b3d645cbc5b7a77fed1ce657b39b63c13e997d6bbf2f66a079cac8618249d3

      • memory/3504-149-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-150-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-151-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-152-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-153-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/3504-146-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-143-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/3504-145-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/4680-134-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4680-138-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4680-135-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB