Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 18:55

General

  • Target

    d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69.exe

  • Size

    45KB

  • MD5

    8288eb7f69159a7fa067e3c737e9c1b0

  • SHA1

    9f1a33e216a870a217467291c290a3840e89afd5

  • SHA256

    d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69

  • SHA512

    c1edbe7ea6ea0e96bc2a529b2f155b5d903f0ee27b1ffa05fa7b977f89f3a1400a2045e99ba0c55ed51f77839d5bc9629f83a24e224b823d909ca84d313de943

  • SSDEEP

    768:5/yHQteXjNT+moSaMf0Y82+fPaLANArOGpldbx/hrwGdr:ZyHQETNymPnOasNAtdJhPr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69.exe
    "C:\Users\Admin\AppData\Local\Temp\d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /t /im KSafeTray.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1932
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D9BF59~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1136
  • C:\Windows\SysWOW64\caycwq.exe
    C:\Windows\SysWOW64\caycwq.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /t /im KSafeTray.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\caycwq.exe

    Filesize

    45KB

    MD5

    8288eb7f69159a7fa067e3c737e9c1b0

    SHA1

    9f1a33e216a870a217467291c290a3840e89afd5

    SHA256

    d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69

    SHA512

    c1edbe7ea6ea0e96bc2a529b2f155b5d903f0ee27b1ffa05fa7b977f89f3a1400a2045e99ba0c55ed51f77839d5bc9629f83a24e224b823d909ca84d313de943

  • C:\Windows\SysWOW64\caycwq.exe

    Filesize

    45KB

    MD5

    8288eb7f69159a7fa067e3c737e9c1b0

    SHA1

    9f1a33e216a870a217467291c290a3840e89afd5

    SHA256

    d9bf5969d5d6d3d45389be25e4d68b3cd5aab743d51de4e0476eec63f033ee69

    SHA512

    c1edbe7ea6ea0e96bc2a529b2f155b5d903f0ee27b1ffa05fa7b977f89f3a1400a2045e99ba0c55ed51f77839d5bc9629f83a24e224b823d909ca84d313de943

  • \Windows\SysWOW64\hra33.dll

    Filesize

    53KB

    MD5

    d9443291d702f85bab0c44412f0a8d0b

    SHA1

    892365908c27ef5970534e283cec871df9f6c574

    SHA256

    fba1639a873cb55a30cfed814d2ed7d8bdd6e01d445f92833101d74245da90ba

    SHA512

    9fc658862c38e8c2133fa2fb98d72f5a1811105512eb42a96e5d573ad0a7d18a43364e95f4f1cfd690a881f6740b7d3fb66a8674e3766da1e042e8d4164faa93

  • memory/1440-54-0x0000000076181000-0x0000000076183000-memory.dmp

    Filesize

    8KB