Analysis

  • max time kernel
    34s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 20:17

General

  • Target

    cea675add5989ca25e1453ea369fc7ca3a5a446d24f4989cea777584633e49cf.exe

  • Size

    2.7MB

  • MD5

    910a5a54bf188c19ba038d075f71f9f2

  • SHA1

    8ad6d793cad967c101a95fa9d1b9256e9b75f17e

  • SHA256

    cea675add5989ca25e1453ea369fc7ca3a5a446d24f4989cea777584633e49cf

  • SHA512

    fa1a172cc36c24237ff4e4ce581e2acff1c703a21dcfe7c2ae27fd1b059ca9414d5bc2137495b062eee373926d1832894832edecb83dd4d750693f2f8a92cb69

  • SSDEEP

    24576:Jqctu0iZ/IG4qZVMAtbw7mywkjpCalWJcU4gHHHicwQgNxujv:JcZei+Adw7vVjwalWJcUzHHHic

Malware Config

Signatures

  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cea675add5989ca25e1453ea369fc7ca3a5a446d24f4989cea777584633e49cf.exe
    "C:\Users\Admin\AppData\Local\Temp\cea675add5989ca25e1453ea369fc7ca3a5a446d24f4989cea777584633e49cf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\160e774a.exe
      C:\160e774a.exe
      2⤵
      • Executes dropped EXE
      • Sets DLL path for service in the registry
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:956
  • C:\Windows\SysWOW64\Svchost.exe
    C:\Windows\SysWOW64\Svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\160e774a.exe

    Filesize

    221KB

    MD5

    b3d1699bac5f4682cda6ca7676f8d333

    SHA1

    009fae507bc8b45b2a6e4f6e3753f60c96d3d692

    SHA256

    62e55bf4c88ceb6ca6ac53a2b3be0144c8939b4d576676f00182ef8bd5117218

    SHA512

    1a22e86d20b3f0cdae51bdef481caf3c83d1c5650c8566efef0bee941b5c4ddaf9d73d60b615de381c7d2e68a96cb118112898afb111ac41b68380a8ecffd571

  • C:\160e774a.exe

    Filesize

    221KB

    MD5

    b3d1699bac5f4682cda6ca7676f8d333

    SHA1

    009fae507bc8b45b2a6e4f6e3753f60c96d3d692

    SHA256

    62e55bf4c88ceb6ca6ac53a2b3be0144c8939b4d576676f00182ef8bd5117218

    SHA512

    1a22e86d20b3f0cdae51bdef481caf3c83d1c5650c8566efef0bee941b5c4ddaf9d73d60b615de381c7d2e68a96cb118112898afb111ac41b68380a8ecffd571

  • C:\Users\Infotmp.txt

    Filesize

    724B

    MD5

    5a2ea1253b0af492db6f54620ac56fff

    SHA1

    52477fb82216c4a8b1c171e159a3b441ce2b7393

    SHA256

    66006bb9d7fb131798d96f4257c0c6ae9a83b30abfcce428d46b013d4ac37a48

    SHA512

    ec523618484735a429308885ef7b43e14600a43389f7abd6a05e9a02cdb3ac3d10ef4658b13782238068d6209ac93f1cc8830bfdc1a5f45392a43ddf08952a4b

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    221KB

    MD5

    0669d63a75b1858b346fc2e650ab3e48

    SHA1

    52529e1ebebdd2d3c447f6044f64639e517d9ef4

    SHA256

    e74d7fd196f966eb88d82c5396181e0c7e159080a173bc69d207ee3a24d4728e

    SHA512

    af0d747f01a91a09f21e4b68258f6f285fd502f2b021dc25574a343a20f3a1abd0b1a86129385a4d9eada81808ea32ed9718c606ad002721a1b96b31c38a39c8

  • \Windows\SysWOW64\12850548.tmp

    Filesize

    221KB

    MD5

    0669d63a75b1858b346fc2e650ab3e48

    SHA1

    52529e1ebebdd2d3c447f6044f64639e517d9ef4

    SHA256

    e74d7fd196f966eb88d82c5396181e0c7e159080a173bc69d207ee3a24d4728e

    SHA512

    af0d747f01a91a09f21e4b68258f6f285fd502f2b021dc25574a343a20f3a1abd0b1a86129385a4d9eada81808ea32ed9718c606ad002721a1b96b31c38a39c8

  • \Windows\SysWOW64\FastUserSwitchingCompatibility.dll

    Filesize

    221KB

    MD5

    0669d63a75b1858b346fc2e650ab3e48

    SHA1

    52529e1ebebdd2d3c447f6044f64639e517d9ef4

    SHA256

    e74d7fd196f966eb88d82c5396181e0c7e159080a173bc69d207ee3a24d4728e

    SHA512

    af0d747f01a91a09f21e4b68258f6f285fd502f2b021dc25574a343a20f3a1abd0b1a86129385a4d9eada81808ea32ed9718c606ad002721a1b96b31c38a39c8

  • memory/732-72-0x0000000074CB0000-0x0000000074CF7000-memory.dmp

    Filesize

    284KB

  • memory/732-76-0x0000000074CB0000-0x0000000074CF7000-memory.dmp

    Filesize

    284KB

  • memory/732-73-0x0000000074CB0000-0x0000000074CF7000-memory.dmp

    Filesize

    284KB

  • memory/836-55-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

    Filesize

    8KB

  • memory/836-54-0x0000000000400000-0x00000000006B0000-memory.dmp

    Filesize

    2.7MB

  • memory/836-78-0x0000000000400000-0x00000000006B0000-memory.dmp

    Filesize

    2.7MB

  • memory/836-59-0x0000000000310000-0x0000000000357000-memory.dmp

    Filesize

    284KB

  • memory/836-58-0x0000000000310000-0x0000000000357000-memory.dmp

    Filesize

    284KB

  • memory/956-68-0x0000000074CC0000-0x0000000074D07000-memory.dmp

    Filesize

    284KB

  • memory/956-67-0x0000000076AC0000-0x0000000076B20000-memory.dmp

    Filesize

    384KB

  • memory/956-62-0x0000000001100000-0x0000000001147000-memory.dmp

    Filesize

    284KB

  • memory/956-60-0x0000000001100000-0x0000000001147000-memory.dmp

    Filesize

    284KB

  • memory/956-63-0x0000000001100000-0x0000000001147000-memory.dmp

    Filesize

    284KB

  • memory/956-77-0x0000000076AC0000-0x0000000076B20000-memory.dmp

    Filesize

    384KB

  • memory/956-75-0x0000000001100000-0x0000000001147000-memory.dmp

    Filesize

    284KB

  • memory/956-66-0x0000000002550000-0x0000000006550000-memory.dmp

    Filesize

    64.0MB