Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 19:04

General

  • Target

    f66eb73df3cd0229cc1dd1ddb8dab304f40c353c7e0b0cfeb87c30cf247c00d0.exe

  • Size

    297KB

  • MD5

    8314d07af946d4ba26cc7d78c4060250

  • SHA1

    9587793d8298b2f68741adb54ff26094decba006

  • SHA256

    f66eb73df3cd0229cc1dd1ddb8dab304f40c353c7e0b0cfeb87c30cf247c00d0

  • SHA512

    352e89ff576091c2a111ceadce0a5fd499118ee5589866fd49b881c93ec887493d0d4b633ffc88b7bd73218928fcdcaf99c70e29a11ee7c3a9af4b8a39c3dd83

  • SSDEEP

    3072:ypx9OyYbAhhCIIY5UYFmyhL4HqqbqBX68fhgVSqqIVhKmg1DAXq33gdbw536cWP8:yLAyVhhGHuL4KTBXv1HmaA4+Moc+wP

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\f66eb73df3cd0229cc1dd1ddb8dab304f40c353c7e0b0cfeb87c30cf247c00d0.exe
        "C:\Users\Admin\AppData\Local\Temp\f66eb73df3cd0229cc1dd1ddb8dab304f40c353c7e0b0cfeb87c30cf247c00d0.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Users\Admin\AppData\Roaming\Koaxz\irebl.exe
          "C:\Users\Admin\AppData\Roaming\Koaxz\irebl.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:968
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\TUI4952.bat"
          3⤵
          • Deletes itself
          PID:820
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1224
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1132

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TUI4952.bat

          Filesize

          303B

          MD5

          528775241519c6704e38a7fa40e68847

          SHA1

          26a0cafbc3aded6162fbdb5e11a2b0cbf1f3e233

          SHA256

          07d3f7148118f6f510e6739ad0d7d3d3cfc4b734da319a03750e38ca1104fbe6

          SHA512

          bcb2b9b1fdbc2906eb2959d4527faf34d507b8cb78b7720a8d226e5b8e89b55924d2c7f8ad322f10714fd179d7550720e89a35ecc376ea3f2b9bccd122ed7853

        • C:\Users\Admin\AppData\Roaming\Koaxz\irebl.exe

          Filesize

          297KB

          MD5

          fe0804bdce1d5590cfcdfea9b8804c4f

          SHA1

          628bebc145d76c55071631210cb704c4afbae065

          SHA256

          d2b2885eba4fab25b42026bd6962a87dd77ce848282ac64fccb8fdade4411929

          SHA512

          16211edf297d7d16e68fc7d835b857cd683658b50a98fdc6aa271b788995814584dc3773c1b1da7e18c8705625fd60ce5c3f3277501835da06405be35d258d13

        • C:\Users\Admin\AppData\Roaming\Koaxz\irebl.exe

          Filesize

          297KB

          MD5

          fe0804bdce1d5590cfcdfea9b8804c4f

          SHA1

          628bebc145d76c55071631210cb704c4afbae065

          SHA256

          d2b2885eba4fab25b42026bd6962a87dd77ce848282ac64fccb8fdade4411929

          SHA512

          16211edf297d7d16e68fc7d835b857cd683658b50a98fdc6aa271b788995814584dc3773c1b1da7e18c8705625fd60ce5c3f3277501835da06405be35d258d13

        • \Users\Admin\AppData\Roaming\Koaxz\irebl.exe

          Filesize

          297KB

          MD5

          fe0804bdce1d5590cfcdfea9b8804c4f

          SHA1

          628bebc145d76c55071631210cb704c4afbae065

          SHA256

          d2b2885eba4fab25b42026bd6962a87dd77ce848282ac64fccb8fdade4411929

          SHA512

          16211edf297d7d16e68fc7d835b857cd683658b50a98fdc6aa271b788995814584dc3773c1b1da7e18c8705625fd60ce5c3f3277501835da06405be35d258d13

        • \Users\Admin\AppData\Roaming\Koaxz\irebl.exe

          Filesize

          297KB

          MD5

          fe0804bdce1d5590cfcdfea9b8804c4f

          SHA1

          628bebc145d76c55071631210cb704c4afbae065

          SHA256

          d2b2885eba4fab25b42026bd6962a87dd77ce848282ac64fccb8fdade4411929

          SHA512

          16211edf297d7d16e68fc7d835b857cd683658b50a98fdc6aa271b788995814584dc3773c1b1da7e18c8705625fd60ce5c3f3277501835da06405be35d258d13

        • memory/820-112-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-114-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/820-101-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/820-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-98-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/820-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-100-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/820-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/820-103-0x000000000006CA70-mapping.dmp

        • memory/820-102-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/968-59-0x0000000000000000-mapping.dmp

        • memory/968-63-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1132-70-0x0000000000330000-0x0000000000378000-memory.dmp

          Filesize

          288KB

        • memory/1132-65-0x0000000000330000-0x0000000000378000-memory.dmp

          Filesize

          288KB

        • memory/1132-67-0x0000000000330000-0x0000000000378000-memory.dmp

          Filesize

          288KB

        • memory/1132-68-0x0000000000330000-0x0000000000378000-memory.dmp

          Filesize

          288KB

        • memory/1132-69-0x0000000000330000-0x0000000000378000-memory.dmp

          Filesize

          288KB

        • memory/1224-76-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1224-73-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1224-74-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1224-75-0x0000000001C80000-0x0000000001CC8000-memory.dmp

          Filesize

          288KB

        • memory/1260-80-0x00000000029F0000-0x0000000002A38000-memory.dmp

          Filesize

          288KB

        • memory/1260-82-0x00000000029F0000-0x0000000002A38000-memory.dmp

          Filesize

          288KB

        • memory/1260-79-0x00000000029F0000-0x0000000002A38000-memory.dmp

          Filesize

          288KB

        • memory/1260-81-0x00000000029F0000-0x0000000002A38000-memory.dmp

          Filesize

          288KB

        • memory/1672-105-0x0000000001E40000-0x0000000001E88000-memory.dmp

          Filesize

          288KB

        • memory/1672-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-91-0x0000000001E40000-0x0000000001E8F000-memory.dmp

          Filesize

          316KB

        • memory/1672-95-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1672-88-0x0000000001E40000-0x0000000001E88000-memory.dmp

          Filesize

          288KB

        • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

          Filesize

          8KB

        • memory/1672-87-0x0000000001E40000-0x0000000001E88000-memory.dmp

          Filesize

          288KB

        • memory/1672-86-0x0000000001E40000-0x0000000001E88000-memory.dmp

          Filesize

          288KB

        • memory/1672-85-0x0000000001E40000-0x0000000001E88000-memory.dmp

          Filesize

          288KB

        • memory/1672-55-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/1672-56-0x0000000000401000-0x0000000000441000-memory.dmp

          Filesize

          256KB