Analysis

  • max time kernel
    170s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 23:21

General

  • Target

    a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe

  • Size

    993KB

  • MD5

    c62fd2c527cf99a0bd9b5974adf6bce8

  • SHA1

    3daf381c15b9c16211b33f505f866d244f1de7f7

  • SHA256

    a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0

  • SHA512

    3520af2c863b7427eb6ac54ff92c5eb374d2f14bb3019fccac0eb1cf8570f33cee7881ec341b0a6412b5676aa21a090bfa073c92d602f7655d01419c1d96c659

  • SSDEEP

    24576:z4lavt0LkLL9IMixoEgeau1wYQrq9MmCS:Gkwkn9IMHeaumYWaPCS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1132
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1276
        • C:\Users\Admin\AppData\Local\Temp\a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe
          "C:\Users\Admin\AppData\Local\Temp\a7253c61ac75d6392b22c3180e07b92c1f0ff2436ce1d27b061a85602c3984b0.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2032
          • C:\Users\Admin\AppData\Local\Temp\696\696.exe
            "C:\Users\Admin\AppData\Local\Temp\696\696.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1980
            • C:\Users\Admin\AppData\Roaming\Peef\kuem.exe
              "C:\Users\Admin\AppData\Roaming\Peef\kuem.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1204
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa17e73ac.bat"
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1976
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1236
        • C:\Program Files\Windows Mail\WinMail.exe
          "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
          1⤵
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1636
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "1267026280-1468471636542107054-200360568-605179609-1913564641755804401-319736228"
          1⤵
            PID:852
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1068
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:992

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • C:\Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • C:\Users\Admin\AppData\Local\Temp\tmpa17e73ac.bat

                Filesize

                193B

                MD5

                0d391993c957a23ccf2bc3826ecb22e6

                SHA1

                9a902c73c603f92b7bc0674593a3ad0bc34caa11

                SHA256

                2338044a161d234f380175eeb8e3485be4e9e20eba3d165889b06c12da804cb2

                SHA512

                cd3d8fcb36804d3f708bd76b29bae8eaf394c32ab8603cfe45b45ce53ee0b8aa7f3928fd2385e6974583a599957c2c4358dbf3154fd5b0b9804af293e29647ea

              • C:\Users\Admin\AppData\Roaming\Moci\myfa.fua

                Filesize

                341B

                MD5

                a2ddc75a44306a5471d5c2a956c4fc63

                SHA1

                fb3db40b5d589c2c1b19adb13d6f7e2a6fcb839f

                SHA256

                a7dbc1fe0612c3c1dcb6036b13f0fac3fa43d1daa5ff14db83e5735261f0ce40

                SHA512

                eab8df16316a3b5ad7782e9ec9796d6771c45fd47977bda135f297d01f688b2e044d93a36824d4d571f39041bde3c42478b104050877316905b3c5b9169b0cd5

              • C:\Users\Admin\AppData\Roaming\Peef\kuem.exe

                Filesize

                138KB

                MD5

                d3b8ce4a606dd7266454c4b79c14752f

                SHA1

                c72fb5791b296077cbc15a9fecc6f0504c712524

                SHA256

                f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8

                SHA512

                df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132

              • C:\Users\Admin\AppData\Roaming\Peef\kuem.exe

                Filesize

                138KB

                MD5

                d3b8ce4a606dd7266454c4b79c14752f

                SHA1

                c72fb5791b296077cbc15a9fecc6f0504c712524

                SHA256

                f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8

                SHA512

                df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132

              • \Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • \Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • \Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • \Users\Admin\AppData\Local\Temp\696\696.exe

                Filesize

                138KB

                MD5

                f771164a4981468ea1c7c1e3ed21b04a

                SHA1

                0fd9ffe6248e6a959293b3c9f98940c402b91423

                SHA256

                f44ef395a7ac322848a3558748465fd8d3d26c15e8efcea5896de610a53237c4

                SHA512

                1a0e6ce07d66624373cc49628b9a156466b83633950f61897fc4d02dcd71f78d780c1799f32bc879ffe0293ad6c21e7b1209d4243cd34eae7ec71fc7f43e8d08

              • \Users\Admin\AppData\Roaming\Peef\kuem.exe

                Filesize

                138KB

                MD5

                d3b8ce4a606dd7266454c4b79c14752f

                SHA1

                c72fb5791b296077cbc15a9fecc6f0504c712524

                SHA256

                f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8

                SHA512

                df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132

              • \Users\Admin\AppData\Roaming\Peef\kuem.exe

                Filesize

                138KB

                MD5

                d3b8ce4a606dd7266454c4b79c14752f

                SHA1

                c72fb5791b296077cbc15a9fecc6f0504c712524

                SHA256

                f767175e632539d7ff03ab5acdab6b06d1d57256254a5c3057290b4e1918dfe8

                SHA512

                df196d38097f5719f77b51d50a0fcdb0ad9a7b8b28d1eb2dc578b354598c37ba29ad1c784a7c23063fea2860217e6fe1d2080e40a5ff5fe34a942ebc4abbb132

              • memory/852-127-0x00000000019D0000-0x00000000019F7000-memory.dmp

                Filesize

                156KB

              • memory/852-128-0x00000000019D0000-0x00000000019F7000-memory.dmp

                Filesize

                156KB

              • memory/852-126-0x00000000019D0000-0x00000000019F7000-memory.dmp

                Filesize

                156KB

              • memory/852-125-0x00000000019D0000-0x00000000019F7000-memory.dmp

                Filesize

                156KB

              • memory/1068-135-0x0000000001DD0000-0x0000000001DF7000-memory.dmp

                Filesize

                156KB

              • memory/1132-72-0x0000000001DE0000-0x0000000001E07000-memory.dmp

                Filesize

                156KB

              • memory/1132-74-0x0000000001DE0000-0x0000000001E07000-memory.dmp

                Filesize

                156KB

              • memory/1132-73-0x0000000001DE0000-0x0000000001E07000-memory.dmp

                Filesize

                156KB

              • memory/1132-69-0x0000000001DE0000-0x0000000001E07000-memory.dmp

                Filesize

                156KB

              • memory/1132-71-0x0000000001DE0000-0x0000000001E07000-memory.dmp

                Filesize

                156KB

              • memory/1236-77-0x00000000001C0000-0x00000000001E7000-memory.dmp

                Filesize

                156KB

              • memory/1236-79-0x00000000001C0000-0x00000000001E7000-memory.dmp

                Filesize

                156KB

              • memory/1236-78-0x00000000001C0000-0x00000000001E7000-memory.dmp

                Filesize

                156KB

              • memory/1236-80-0x00000000001C0000-0x00000000001E7000-memory.dmp

                Filesize

                156KB

              • memory/1276-84-0x00000000029B0000-0x00000000029D7000-memory.dmp

                Filesize

                156KB

              • memory/1276-83-0x00000000029B0000-0x00000000029D7000-memory.dmp

                Filesize

                156KB

              • memory/1276-85-0x00000000029B0000-0x00000000029D7000-memory.dmp

                Filesize

                156KB

              • memory/1276-86-0x00000000029B0000-0x00000000029D7000-memory.dmp

                Filesize

                156KB

              • memory/1636-113-0x0000000003B90000-0x0000000003BB7000-memory.dmp

                Filesize

                156KB

              • memory/1636-95-0x000007FEF62E1000-0x000007FEF62E3000-memory.dmp

                Filesize

                8KB

              • memory/1636-96-0x0000000002200000-0x0000000002210000-memory.dmp

                Filesize

                64KB

              • memory/1636-102-0x0000000002260000-0x0000000002270000-memory.dmp

                Filesize

                64KB

              • memory/1636-110-0x0000000003B90000-0x0000000003BB7000-memory.dmp

                Filesize

                156KB

              • memory/1636-111-0x0000000003B90000-0x0000000003BB7000-memory.dmp

                Filesize

                156KB

              • memory/1636-112-0x0000000003B90000-0x0000000003BB7000-memory.dmp

                Filesize

                156KB

              • memory/1636-94-0x000007FEFC451000-0x000007FEFC453000-memory.dmp

                Filesize

                8KB

              • memory/1976-121-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1976-130-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1976-120-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1976-132-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1976-117-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1976-119-0x0000000000050000-0x0000000000077000-memory.dmp

                Filesize

                156KB

              • memory/1980-91-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1980-93-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1980-92-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1980-90-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/1980-89-0x0000000000270000-0x0000000000297000-memory.dmp

                Filesize

                156KB

              • memory/2032-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

                Filesize

                8KB