Analysis

  • max time kernel
    150s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2022 16:12

General

  • Target

    0e476a9c599635ddbfffc15ac219d65daf35aa1767ec5332ff0d9ce6d16d1c34.exe

  • Size

    340KB

  • MD5

    097be9ccdaf9e6fbb03d420a41c6ae11

  • SHA1

    f5e1fe23d86eedcf576b18310b57fcbd230aaea6

  • SHA256

    0e476a9c599635ddbfffc15ac219d65daf35aa1767ec5332ff0d9ce6d16d1c34

  • SHA512

    261e8b6155543504a9a0238dfcfddc98c9255cd8044746d7ff074357ab85d212721d25f2e9269c9d78f535079dc71779eafd385120f95c4c43aaf2474c717374

  • SSDEEP

    6144:aIQ/RHVs4LWzfte7s4bN9/fAbB1qJzEXXz4TOLiCjvSJhFSZH:aIQ/BVh4fteA4zYbB1MAnyehWFCH

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e476a9c599635ddbfffc15ac219d65daf35aa1767ec5332ff0d9ce6d16d1c34.exe
    "C:\Users\Admin\AppData\Local\Temp\0e476a9c599635ddbfffc15ac219d65daf35aa1767ec5332ff0d9ce6d16d1c34.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\\DelSelf.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 5 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2040
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k XYYFQTFYS -s CFTHKQWTN
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    PID:4304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\DelSelf.bat

    Filesize

    285B

    MD5

    49f58a8b896c30ad7fffc9fd770b4c5e

    SHA1

    9843867ea3623c75a658761a5d0b4ff4d63cd34d

    SHA256

    61a193d2895ba0c731ae2cb8e218b306ff410bae8b1c6de90646d40adc7fbfb3

    SHA512

    89f8ac16991cbeb8c9c013f05832d461174e1e2a4251446aedead166c5a7c0010471f1cf8e80d8083d113249be02cb554a4909359d2d079b3ebb8bb3bfaa7c28

  • C:\Windows\SysWOW64\EMRVbeijoqtwID34.DLL

    Filesize

    650KB

    MD5

    402e52d2a1875ed7e42fbdc139a7635c

    SHA1

    c46d9a8aa85b10bee719c376134ba0d8b196cab7

    SHA256

    63eed34e87f30e633a0f07a2813bd944a7565a766714f4109fb5279019c87e5a

    SHA512

    0a6f87adc3aeb4b0afa97150af1bc52ec3ffd7e7b021f7bacea8fc32527026f0b813a342046b2637dde9f681a7b3a178baae3a734911ca562caa1cc1cd785c9e

  • C:\Windows\SysWOW64\EMRVbeijoqtwID34.DLL

    Filesize

    650KB

    MD5

    402e52d2a1875ed7e42fbdc139a7635c

    SHA1

    c46d9a8aa85b10bee719c376134ba0d8b196cab7

    SHA256

    63eed34e87f30e633a0f07a2813bd944a7565a766714f4109fb5279019c87e5a

    SHA512

    0a6f87adc3aeb4b0afa97150af1bc52ec3ffd7e7b021f7bacea8fc32527026f0b813a342046b2637dde9f681a7b3a178baae3a734911ca562caa1cc1cd785c9e

  • C:\Windows\SysWOW64\EMRVbeijoqtwID34.DLL

    Filesize

    650KB

    MD5

    402e52d2a1875ed7e42fbdc139a7635c

    SHA1

    c46d9a8aa85b10bee719c376134ba0d8b196cab7

    SHA256

    63eed34e87f30e633a0f07a2813bd944a7565a766714f4109fb5279019c87e5a

    SHA512

    0a6f87adc3aeb4b0afa97150af1bc52ec3ffd7e7b021f7bacea8fc32527026f0b813a342046b2637dde9f681a7b3a178baae3a734911ca562caa1cc1cd785c9e

  • \??\c:\windows\SysWOW64\emrvbeijoqtwid34.dll

    Filesize

    650KB

    MD5

    402e52d2a1875ed7e42fbdc139a7635c

    SHA1

    c46d9a8aa85b10bee719c376134ba0d8b196cab7

    SHA256

    63eed34e87f30e633a0f07a2813bd944a7565a766714f4109fb5279019c87e5a

    SHA512

    0a6f87adc3aeb4b0afa97150af1bc52ec3ffd7e7b021f7bacea8fc32527026f0b813a342046b2637dde9f681a7b3a178baae3a734911ca562caa1cc1cd785c9e

  • memory/2816-134-0x00000000023A0000-0x0000000002448000-memory.dmp

    Filesize

    672KB