Analysis

  • max time kernel
    33s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 21:30

General

  • Target

    df301ac6629e088796aff315db34106b466adac3b6879331da1570a2f611414c.exe

  • Size

    65KB

  • MD5

    a150ead5cce3ec3c45c0760d8f8209f0

  • SHA1

    6d37d530903d813709d1b3d9c83a18a7eb7ef896

  • SHA256

    df301ac6629e088796aff315db34106b466adac3b6879331da1570a2f611414c

  • SHA512

    d5d5ee6e90d56e5c18b13a6d54bc3f6cd4fb64efb73a0d008bfd6f2ec2a8f484c69ace957f799626a118fcc1b2142bae3b2a0368b08931f72d9f38e67688529f

  • SSDEEP

    1536:E80RoKEC8nhr23KqL9PcA0Vm1rZ3EJaMxOvQ4600mvK6NB:0eKEdr235L9P0E1rkaMxOon03B

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 12 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df301ac6629e088796aff315db34106b466adac3b6879331da1570a2f611414c.exe
    "C:\Users\Admin\AppData\Local\Temp\df301ac6629e088796aff315db34106b466adac3b6879331da1570a2f611414c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:1492
      • C:\Windows\SysWOW64\net.exe
        net stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
            PID:332
        • C:\Windows\SysWOW64\net.exe
          net stop System Restore Service
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:980
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop System Restore Service
            3⤵
              PID:812
          • C:\Windows\SysWOW64\net.exe
            net stop "Security Center"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Security Center"
              3⤵
                PID:2004
            • C:\Windows\SysWOW64\net.exe
              net stop "Windows Firewall/Internet Connection Sharing (ICS)"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1744
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
                3⤵
                  PID:1416
              • C:\Windows\SysWOW64\net.exe
                net stop System Restore Service
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1924
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop System Restore Service
                  3⤵
                    PID:756
                • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
                  C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:320
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c del C:\NTDUBECT.EXE
                  2⤵
                  • Deletes itself
                  PID:1968

              Network

                    MITRE ATT&CK Matrix

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • \Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • \Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • \Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • \Users\Admin\AppData\Local\Temp\SETUP.EXE

                      Filesize

                      19KB

                      MD5

                      d07468a081473a6e41c27a7a949700bf

                      SHA1

                      b9bea089783b3f97790801376fd1204037e61824

                      SHA256

                      684cce5a3423323d350206bece1a70750cf342c53ab6c315ca478bf705f47a00

                      SHA512

                      51e0fdf08f97bc9e1066de859f787efb10cd5a1e1fcd039ceb2c3eaf796fb4aef7f62fc9651c54b3c5a37139d523014e00df35ec23611a251fae1871b270c720

                    • \Windows\SysWOW64\pedadt.dll

                      Filesize

                      227KB

                      MD5

                      d34e189539979b8ed12d7e70b167c24f

                      SHA1

                      9f63d51764b71a7a3f38381a81b71f13b0f35ee9

                      SHA256

                      976124601f3c58a8c7cf40dcba918ad46679ee9fff77f9c8be1e4a8ac26e14fd

                      SHA512

                      bafe661c5e8df7f02d06dac883a317857c643b16f0237b619c2f9b30d33fe2c00886f7b600dc0ac5054fcdcd67a97d2a8a726788a5af17e1243ba5af742fb9a7

                    • memory/320-75-0x0000000000520000-0x000000000052D000-memory.dmp

                      Filesize

                      52KB

                    • memory/320-70-0x0000000075D01000-0x0000000075D03000-memory.dmp

                      Filesize

                      8KB