Analysis

  • max time kernel
    137s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 11:53

General

  • Target

    de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842.exe

  • Size

    125KB

  • MD5

    93e0190fb027672f386ddce1b0737503

  • SHA1

    e2b3d325a2ed0f9224815141d00970510fc527ef

  • SHA256

    de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842

  • SHA512

    84d1cad7e3df859d711ba5a54d9a3938417758ba14ab0bb9c45d419d7d876996cf2a10f992e460d4ec80355152c0019332b3cc7e34c6f6903833ad0139b3fa33

  • SSDEEP

    3072:HTh+VUnCPMTADCcjKZxzYrm8Xp5fs9YxIJF:HAoCP0ACBzYXp5E9YqJ

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Modifies registry class 6 IoCs
  • NTFS ADS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:468
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842.exe
      "C:\Users\Admin\AppData\Local\Temp\de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Admin\AppData\Local\Temp\de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842.exe
        "C:\Users\Admin\AppData\Local\Temp\de4865ba37f0e3a13018ad34a0be6298fc75606f6e292f0d62111efafa811842.exe"
        3⤵
        • Modifies security service
        • Registers COM server for autorun
        • Drops file in Program Files directory
        • Modifies registry class
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1748

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-18\$d4e37f8e5af09b64e86d0830097e992e\@

          Filesize

          2KB

          MD5

          5e1cf86df65d97dcdd5437c8f4ab51d6

          SHA1

          1fc061458afa17012b988a98e6eb4c6ced5f8c6e

          SHA256

          794c9d112ef3b5854595f9805d8940f634dcd1c3e95a1ca77e593beab970e5f7

          SHA512

          17cf55457b89e1d155668b528d73b571949e38f2d47b2c09676149b28d6c831f3131e038bf1ff41d6582d5c1f5ced93bdfd86b317b9452a5a950e2ffc4880a00

        • C:\$Recycle.Bin\S-1-5-18\$d4e37f8e5af09b64e86d0830097e992e\n

          Filesize

          41KB

          MD5

          fb4e3236959152a057bc6b7603c538ef

          SHA1

          b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

          SHA256

          8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

          SHA512

          993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

        • C:\$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\$d4e37f8e5af09b64e86d0830097e992e\n

          Filesize

          41KB

          MD5

          fb4e3236959152a057bc6b7603c538ef

          SHA1

          b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

          SHA256

          8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

          SHA512

          993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

        • \$Recycle.Bin\S-1-5-18\$d4e37f8e5af09b64e86d0830097e992e\n

          Filesize

          41KB

          MD5

          fb4e3236959152a057bc6b7603c538ef

          SHA1

          b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

          SHA256

          8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

          SHA512

          993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

        • \$Recycle.Bin\S-1-5-21-4063495947-34355257-727531523-1000\$d4e37f8e5af09b64e86d0830097e992e\n

          Filesize

          41KB

          MD5

          fb4e3236959152a057bc6b7603c538ef

          SHA1

          b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

          SHA256

          8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

          SHA512

          993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

        • memory/1468-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB

        • memory/1468-55-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1468-69-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1748-63-0x0000000000240000-0x000000000027C000-memory.dmp

          Filesize

          240KB

        • memory/1748-70-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB