Analysis

  • max time kernel
    152s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 13:15

General

  • Target

    3f882ccb96a1a9ad3ea5131447c859b76440f9116039927c9b70b4f07533a942.exe

  • Size

    19KB

  • MD5

    a1ba8a9c32659299f0d46ce39ccb0923

  • SHA1

    c3bfddf7ed573fefb02843cdc461e6db8c565c48

  • SHA256

    3f882ccb96a1a9ad3ea5131447c859b76440f9116039927c9b70b4f07533a942

  • SHA512

    ad3edbdbf3f21cfec9a0717500c4296bf3e6d63a567cc26ace72acb705df373f92b9265421c0236a85928af5e8067f9ae07f44594e8fdf17f83183ae8a859577

  • SSDEEP

    384:g58AcUoUQKNRYELxQUHDvmk3E+KDvB77777J77c77c77c72qh5SenSU:g5BOFKksO1mE9B77777J77c77c77c71t

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Kills process with taskkill 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f882ccb96a1a9ad3ea5131447c859b76440f9116039927c9b70b4f07533a942.exe
    "C:\Users\Admin\AppData\Local\Temp\3f882ccb96a1a9ad3ea5131447c859b76440f9116039927c9b70b4f07533a942.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:916
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM services.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1740
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1696
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:964
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1588
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1228
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:268
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM services.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:840
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1048
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1524
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1800
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:956
    • C:\Windows\AAD1DD.exe
      C:\Windows\AAD1DD.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1628
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM services.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1876
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:872
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1144
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM services.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1660
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
      • C:\Windows\SysWOW64\TASKKILL.exe
        TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2176
      • C:\Windows\AAD1DDRVUYQZ.exe
        C:\Windows\AAD1DDRVUYQZ.exe
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:2244
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2272
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM services.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2284
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2304
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2328
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2360
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2384
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2408
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2444
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM services.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2472
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM lsass.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2512
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM csrss.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2556
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM smss.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2580
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2612
        • C:\Windows\SysWOW64\TASKKILL.exe
          TASKKILL /S COMPUTERNAME /F /IM svchost.exe /T
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2652
        • C:\Windows\AAD1DDRVUYQZ.exe
          C:\Windows\AAD1DDRVUYQZ.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2688
        • C:\Windows\AAD1DD.exe
          C:\Windows\AAD1DD.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2744
      • C:\Windows\AAD1DD.exe
        C:\Windows\AAD1DD.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AAD1DD.exe

    Filesize

    33KB

    MD5

    4ed0f79a2aa80fb40083586e669d5852

    SHA1

    c8776be2e983c162d82a9bf3c25cace7ba6ff823

    SHA256

    a0142620684517d4d5f5dbfce2c6ef785cfbfac5b7c03d17e6acbd131b57bc4c

    SHA512

    d4397e5aa431593ca098478c636c1356bdac6df96e8acd3c5e887cedd714d2fd5a9d93ab5a0735c77eef8e48ceb210e707feb501bfb3e0b0883db2f8be9d769d

  • C:\Windows\AAD1DD.exe

    Filesize

    33KB

    MD5

    4ed0f79a2aa80fb40083586e669d5852

    SHA1

    c8776be2e983c162d82a9bf3c25cace7ba6ff823

    SHA256

    a0142620684517d4d5f5dbfce2c6ef785cfbfac5b7c03d17e6acbd131b57bc4c

    SHA512

    d4397e5aa431593ca098478c636c1356bdac6df96e8acd3c5e887cedd714d2fd5a9d93ab5a0735c77eef8e48ceb210e707feb501bfb3e0b0883db2f8be9d769d

  • C:\Windows\AAD1DD.exe

    Filesize

    33KB

    MD5

    4ed0f79a2aa80fb40083586e669d5852

    SHA1

    c8776be2e983c162d82a9bf3c25cace7ba6ff823

    SHA256

    a0142620684517d4d5f5dbfce2c6ef785cfbfac5b7c03d17e6acbd131b57bc4c

    SHA512

    d4397e5aa431593ca098478c636c1356bdac6df96e8acd3c5e887cedd714d2fd5a9d93ab5a0735c77eef8e48ceb210e707feb501bfb3e0b0883db2f8be9d769d

  • C:\Windows\AAD1DD.exe

    Filesize

    33KB

    MD5

    4ed0f79a2aa80fb40083586e669d5852

    SHA1

    c8776be2e983c162d82a9bf3c25cace7ba6ff823

    SHA256

    a0142620684517d4d5f5dbfce2c6ef785cfbfac5b7c03d17e6acbd131b57bc4c

    SHA512

    d4397e5aa431593ca098478c636c1356bdac6df96e8acd3c5e887cedd714d2fd5a9d93ab5a0735c77eef8e48ceb210e707feb501bfb3e0b0883db2f8be9d769d

  • C:\Windows\AAD1DDRVUYQZ.exe

    Filesize

    20KB

    MD5

    df73e8d627434aaa212d3d3fd216c5cb

    SHA1

    1509c75449800a34e5103ef12a6737cb29149f3b

    SHA256

    b130dd0468aef5e3842e2fe5d6e1572495d98ada4fa7298e6b9a692aa643499f

    SHA512

    199c67190f5e0bf34aefdd85f080f8b38e5d8541c81fe2fc1e3e9c08a62bd1d217c5a4cd0d496dbc5bd33baa0fc74242355e9674de40288aa31a9b8f47238b4b

  • C:\Windows\AAD1DDRVUYQZ.exe

    Filesize

    20KB

    MD5

    df73e8d627434aaa212d3d3fd216c5cb

    SHA1

    1509c75449800a34e5103ef12a6737cb29149f3b

    SHA256

    b130dd0468aef5e3842e2fe5d6e1572495d98ada4fa7298e6b9a692aa643499f

    SHA512

    199c67190f5e0bf34aefdd85f080f8b38e5d8541c81fe2fc1e3e9c08a62bd1d217c5a4cd0d496dbc5bd33baa0fc74242355e9674de40288aa31a9b8f47238b4b

  • C:\Windows\AAD1DDRVUYQZ.exe

    Filesize

    20KB

    MD5

    df73e8d627434aaa212d3d3fd216c5cb

    SHA1

    1509c75449800a34e5103ef12a6737cb29149f3b

    SHA256

    b130dd0468aef5e3842e2fe5d6e1572495d98ada4fa7298e6b9a692aa643499f

    SHA512

    199c67190f5e0bf34aefdd85f080f8b38e5d8541c81fe2fc1e3e9c08a62bd1d217c5a4cd0d496dbc5bd33baa0fc74242355e9674de40288aa31a9b8f47238b4b

  • memory/1736-130-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1736-125-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1788-124-0x0000000000240000-0x000000000024F000-memory.dmp

    Filesize

    60KB

  • memory/1788-129-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1788-63-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1788-123-0x0000000000240000-0x000000000024F000-memory.dmp

    Filesize

    60KB

  • memory/2244-131-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2244-126-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2688-114-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2744-119-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2776-127-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2776-128-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB