Analysis

  • max time kernel
    51s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 16:05

General

  • Target

    file.exe

  • Size

    821KB

  • MD5

    cd2704f93fec8af2b68204e9cdbd624e

  • SHA1

    b202b77493a3821a97cb08538590be106e5bb551

  • SHA256

    27acd486acf23809f4792ed977bef8cd765d16a37fafe2a4e050284423bce11b

  • SHA512

    768a730c93b83bfc6b3f3c91483043cf85cac2209c6f22413a5c7af99e2ba4cbcf2429f54857af0a08a7adffd350e4d99c351408a0ff3324175985780ccc5bce

  • SSDEEP

    12288:0zLJtMwl1o8fRsbJnf7DQ1JOsZIdlYJcTT4l/kqKN7/UFaXyEjxo1TUI0yjSJKY9:0BFl1NOsZMlYa34lsqEayz23BjSwY9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\tapiunattend.exe
      tapiunattend.exe
      2⤵
        PID:844
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Stephen.wpd & ping -n 5 localhost
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1420
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /FI "imagename eq AvastUI.exe"
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:952
          • C:\Windows\SysWOW64\find.exe
            find /I /N "avastui.exe"
            4⤵
              PID:748
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /FI "imagename eq AVGUI.exe"
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1760
            • C:\Windows\SysWOW64\find.exe
              find /I /N "avgui.exe"
              4⤵
                PID:1752
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V /R "^zehKAILsgvsVLa$" Lenses.wpd
                4⤵
                  PID:900
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Highways.exe.pif
                  Highways.exe.pif Z
                  4⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:616
                • C:\Windows\SysWOW64\PING.EXE
                  ping localhost -n 5
                  4⤵
                  • Runs ping.exe
                  PID:1172
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 5 localhost
                3⤵
                • Runs ping.exe
                PID:1516

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Highways.exe.pif

            Filesize

            925KB

            MD5

            0adb9b817f1df7807576c2d7068dd931

            SHA1

            4a1b94a9a5113106f40cd8ea724703734d15f118

            SHA256

            98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

            SHA512

            883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Highways.exe.pif

            Filesize

            925KB

            MD5

            0adb9b817f1df7807576c2d7068dd931

            SHA1

            4a1b94a9a5113106f40cd8ea724703734d15f118

            SHA256

            98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

            SHA512

            883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Lenses.wpd

            Filesize

            925KB

            MD5

            cd823c5853c2f2faeb7479294f354692

            SHA1

            13676d0930a5a8e9152a619ded85b0ab8ffcff54

            SHA256

            29863ac96337f0452252ac26a57a21b34aeca7d4b25aac41d421e33bfaef515e

            SHA512

            5f9f4e41e7ffd40ddc7b9dc55ba274ad7f42ec418c94d314943abfa9768df9eb467f41a4b4dbdaa51c3e6d74915fa30ad2ad1cf3c31d1a80c87cb6ee6c24e2b0

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Stephen.wpd

            Filesize

            12KB

            MD5

            3473e761d0dc7a8132b5bc81d4985800

            SHA1

            291622594ae4514959b660b7979e3253cbac1302

            SHA256

            4da54b57bb275335a43a03dcfd4243cd8f33999ef6ba9cbac0c78d4e6fd0afb6

            SHA512

            90f3ae83be5167378b0883c299a60aa7e380cfd5d2f7be03e5abb794ba34626470ce663a219be86650e5a468aae8874fae717a7b4b18fcb49762cf1187bea3a4

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vocals.wpd

            Filesize

            853KB

            MD5

            971aed745154583cfd12eb4b0448f9ab

            SHA1

            408251945d26a22b2bd8fa8f039fe471aad20393

            SHA256

            4b010ec6f7f417456a7b9d185330164d40c2388fd45440e79b34587235f37d3d

            SHA512

            84d50066f7cc542c15ee1382ef5a5df8066bff249ada5c9e028655ca55437b53ad7ab8bde1c3bce31d7040ecbe792b5813578d00df08388ad2f2c1fd6f7bacac

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Highways.exe.pif

            Filesize

            925KB

            MD5

            0adb9b817f1df7807576c2d7068dd931

            SHA1

            4a1b94a9a5113106f40cd8ea724703734d15f118

            SHA256

            98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

            SHA512

            883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

          • memory/616-68-0x00000000750A1000-0x00000000750A3000-memory.dmp

            Filesize

            8KB