Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 13:34

General

  • Target

    6f48d8f4ec45805233a718139b5ce62b369ed14770c7222da25a5768d60141a9.exe

  • Size

    69KB

  • MD5

    229755174f816c163410d923a2b38cb2

  • SHA1

    ae1267580b77a7b079fac989887f7290b343ed25

  • SHA256

    6f48d8f4ec45805233a718139b5ce62b369ed14770c7222da25a5768d60141a9

  • SHA512

    aad19b1bc6b2d8c4b62f900ad7203bb0ad286f9f21bc074ec3634d7b48e66a93b8dbc048a9d1224e538aceb6494e6e6b98202c74f78b0434d96469fbda50c78b

  • SSDEEP

    1536:w3F46DH5V3b1fml+k+fytojMWJ4PpRfEpQ+dyf9tU7uUhJM:AS+5VL1fml+kRjfRRfEpQL9i5JM

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f48d8f4ec45805233a718139b5ce62b369ed14770c7222da25a5768d60141a9.exe
    "C:\Users\Admin\AppData\Local\Temp\6f48d8f4ec45805233a718139b5ce62b369ed14770c7222da25a5768d60141a9.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:1260
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k lafijm
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1756

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\SysWOW64\ivqhko.dll

          Filesize

          99KB

          MD5

          34a00d2cf88d219b0a8397d365d47f91

          SHA1

          209743a9b180e18e0e32f3b0b4cf6e7cfb289bf8

          SHA256

          ad5e73aac02250fd5fee8cef4d907c60591f25cbde3134d710ce80a93fb62c39

          SHA512

          15a022bc1764d2e58bc90db089e62b911a0eb65400edb0e8003f2deb045d4505704f833533aa280e604cfbe2b5f577bc1d0762e022bcf1be2d058ba8cd8d34de

        • \Windows\SysWOW64\ivqhko.dll

          Filesize

          99KB

          MD5

          34a00d2cf88d219b0a8397d365d47f91

          SHA1

          209743a9b180e18e0e32f3b0b4cf6e7cfb289bf8

          SHA256

          ad5e73aac02250fd5fee8cef4d907c60591f25cbde3134d710ce80a93fb62c39

          SHA512

          15a022bc1764d2e58bc90db089e62b911a0eb65400edb0e8003f2deb045d4505704f833533aa280e604cfbe2b5f577bc1d0762e022bcf1be2d058ba8cd8d34de

        • \Windows\SysWOW64\ivqhko.dll

          Filesize

          99KB

          MD5

          34a00d2cf88d219b0a8397d365d47f91

          SHA1

          209743a9b180e18e0e32f3b0b4cf6e7cfb289bf8

          SHA256

          ad5e73aac02250fd5fee8cef4d907c60591f25cbde3134d710ce80a93fb62c39

          SHA512

          15a022bc1764d2e58bc90db089e62b911a0eb65400edb0e8003f2deb045d4505704f833533aa280e604cfbe2b5f577bc1d0762e022bcf1be2d058ba8cd8d34de

        • memory/1260-55-0x0000000075291000-0x0000000075293000-memory.dmp

          Filesize

          8KB

        • memory/1756-59-0x0000000010000000-0x000000001001A000-memory.dmp

          Filesize

          104KB

        • memory/1756-60-0x0000000010000000-0x000000001001A000-memory.dmp

          Filesize

          104KB