Analysis

  • max time kernel
    425s
  • max time network
    429s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 23:31

General

  • Target

    73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9.exe

  • Size

    96KB

  • MD5

    2845d59896de45cc6e77cc39db4b0710

  • SHA1

    351131fdcabad360f68cf740f7c2cfeddcc5227b

  • SHA256

    73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

  • SHA512

    bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

  • SSDEEP

    1536:v3i2vQYJt4DTzB5UHiR0LtYa5LBq9fP/N1hXA7YhKZHx8XQIRJjjfqC5e:vXvQWtmB5OA0iWstyY4R8XQELqC5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9.exe
    "C:\Users\Admin\AppData\Local\Temp\73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Roaming\KB00080079.exe
      "C:\Users\Admin\AppData\Roaming\KB00080079.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1312
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\POS732.tmp.BAT"
      2⤵
      • Deletes itself
      PID:760

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\POS732.tmp.BAT

          Filesize

          321B

          MD5

          1f882c27c5a36c1934e07c952015ff8f

          SHA1

          6d73621a47bda6ed7c2baa014d14d3c04380236f

          SHA256

          f97e7c60d8d8aa72722da932726ed9a1a0e03f4177d1cec34c1a5de1174358ba

          SHA512

          7aee00f0c8a2340fbebe187148de75ec2209da36cf9f91471b1255ccf420de08a856c40ba7ac77b3416e5ad16bc7f783a57dd37335fa12e2575be1599e4a980f

        • C:\Users\Admin\AppData\Roaming\KB00080079.exe

          Filesize

          96KB

          MD5

          2845d59896de45cc6e77cc39db4b0710

          SHA1

          351131fdcabad360f68cf740f7c2cfeddcc5227b

          SHA256

          73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

          SHA512

          bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

        • \Users\Admin\AppData\Roaming\KB00080079.exe

          Filesize

          96KB

          MD5

          2845d59896de45cc6e77cc39db4b0710

          SHA1

          351131fdcabad360f68cf740f7c2cfeddcc5227b

          SHA256

          73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

          SHA512

          bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

        • \Users\Admin\AppData\Roaming\KB00080079.exe

          Filesize

          96KB

          MD5

          2845d59896de45cc6e77cc39db4b0710

          SHA1

          351131fdcabad360f68cf740f7c2cfeddcc5227b

          SHA256

          73103b71e0f5cd128afef68d33475a0cf8e89bbe866eb8c1f024401befd657a9

          SHA512

          bd3aa0607fb464e0263f2311e14bd5c9f36ef85de234bcc85b9631ba5ca4db4660981bcb0c4ae7d1246c6a72ee6aac3f1b80112c4382458ab16773f828e996a2

        • memory/620-60-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/620-54-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB

        • memory/620-61-0x0000000000220000-0x0000000000259000-memory.dmp

          Filesize

          228KB

        • memory/1312-63-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1312-64-0x00000000002A0000-0x00000000002D9000-memory.dmp

          Filesize

          228KB

        • memory/1312-66-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/1312-67-0x00000000002A0000-0x00000000002D9000-memory.dmp

          Filesize

          228KB