Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 07:55

General

  • Target

    c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.exe

  • Size

    133KB

  • MD5

    a26dace927c4f2c237124d7ca3113590

  • SHA1

    5860cceb800ba77c81709ec9a8d44fdbad44e1f8

  • SHA256

    c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb

  • SHA512

    2601855306709934f47daa3022e00785c3516fe798ce5ac0940f22221342747c1dcc6afd173d23af589e65b8617fab8b0322f080eb34b43d5f2141d3a39072df

  • SSDEEP

    3072:u0v4Yb2eruGgAaeXWhTj+fe6ja3GmoT4d8y8HafOafaqcIJLCY2:Jvrb22uGLbWhTjYe6TTmZRzSqpO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.exe
    "C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.tmp
      C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.tmp
      2⤵
      • Executes dropped EXE
      PID:3700
    • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.mm
      C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.mm /zhj
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Windows\YZH.exe
        C:\Windows\YZH.exe /zhj
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.mm

    Filesize

    117KB

    MD5

    f11c10b2f3dea621c4560b6e2a2c4bde

    SHA1

    8288713ae27477e6728110d3bd19bf2002fd7f43

    SHA256

    ac70d99a804e630f9b19491539a714bff3470dbc6e59c9bf18ae7b5750737ae9

    SHA512

    7a3d33a9567ea21cdee672049182cd17a591f6abca39eeef41420729db2bfae33e81f3bac571f1befcf3c5457acfdd7e17e203f7bd70f63a57ee4ac115afac07

  • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.mm

    Filesize

    117KB

    MD5

    f11c10b2f3dea621c4560b6e2a2c4bde

    SHA1

    8288713ae27477e6728110d3bd19bf2002fd7f43

    SHA256

    ac70d99a804e630f9b19491539a714bff3470dbc6e59c9bf18ae7b5750737ae9

    SHA512

    7a3d33a9567ea21cdee672049182cd17a591f6abca39eeef41420729db2bfae33e81f3bac571f1befcf3c5457acfdd7e17e203f7bd70f63a57ee4ac115afac07

  • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.tmp

    Filesize

    15KB

    MD5

    74b9fa2afaf60b7f4e2a952e77b9dc6c

    SHA1

    b3a14d8c38f41a146df619976f09011da7c9c5ee

    SHA256

    44e2ecd9699c64d1eeeda36f6cef807e9abfb8091a6a23e9725058d3f2d81a5e

    SHA512

    8390d615aca34b4d64fd135d36327aab859728698f496aadfdecc78175146fdfe92534e28ce37d9644277e7d5d8885ba1353e17ff2f2447ef799e584ad305264

  • C:\Users\Admin\AppData\Local\Temp\c319143ddec6a15ad920cf216dee262ce3f2b8cfbe8d3d49fbfc5b928f3a77cb.tmp

    Filesize

    15KB

    MD5

    74b9fa2afaf60b7f4e2a952e77b9dc6c

    SHA1

    b3a14d8c38f41a146df619976f09011da7c9c5ee

    SHA256

    44e2ecd9699c64d1eeeda36f6cef807e9abfb8091a6a23e9725058d3f2d81a5e

    SHA512

    8390d615aca34b4d64fd135d36327aab859728698f496aadfdecc78175146fdfe92534e28ce37d9644277e7d5d8885ba1353e17ff2f2447ef799e584ad305264

  • C:\Windows\YZH.exe

    Filesize

    117KB

    MD5

    f11c10b2f3dea621c4560b6e2a2c4bde

    SHA1

    8288713ae27477e6728110d3bd19bf2002fd7f43

    SHA256

    ac70d99a804e630f9b19491539a714bff3470dbc6e59c9bf18ae7b5750737ae9

    SHA512

    7a3d33a9567ea21cdee672049182cd17a591f6abca39eeef41420729db2bfae33e81f3bac571f1befcf3c5457acfdd7e17e203f7bd70f63a57ee4ac115afac07

  • C:\Windows\YZH.exe

    Filesize

    117KB

    MD5

    f11c10b2f3dea621c4560b6e2a2c4bde

    SHA1

    8288713ae27477e6728110d3bd19bf2002fd7f43

    SHA256

    ac70d99a804e630f9b19491539a714bff3470dbc6e59c9bf18ae7b5750737ae9

    SHA512

    7a3d33a9567ea21cdee672049182cd17a591f6abca39eeef41420729db2bfae33e81f3bac571f1befcf3c5457acfdd7e17e203f7bd70f63a57ee4ac115afac07

  • memory/452-143-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/452-146-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1792-141-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1792-145-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4548-142-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4548-144-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB