Analysis

  • max time kernel
    152s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 15:54

General

  • Target

    088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe

  • Size

    359KB

  • MD5

    03c98c932377086d5be24c119ff01175

  • SHA1

    0b93bd233ddc8c1cfb5886116f37fb7c1315a5ef

  • SHA256

    088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece

  • SHA512

    bf100d25e83e0043b9c86433968eb5f70395240c79428d51d7fb563ec14e99d394b3c753d7b2c6b686939e2a4f032baa726e9c1146eb526dd6da4ac6f7e80650

  • SSDEEP

    6144:xtF0wPmBjrtRAlXlNa01/Fjm+qbtPeXCOmdsP1F9nb54ceKVwCsI:xt6wPmNrtR+3ae/RmIrv4wzv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2528
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3296
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3464
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3392
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
            1⤵
              PID:3104
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:2436
              • C:\Windows\system32\backgroundTaskHost.exe
                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                1⤵
                  PID:4988
                • C:\Windows\system32\backgroundTaskHost.exe
                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                  1⤵
                    PID:4920
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:4788
                    • C:\Windows\System32\RuntimeBroker.exe
                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                      1⤵
                        PID:3864
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:3560
                        • C:\Windows\Explorer.EXE
                          C:\Windows\Explorer.EXE
                          1⤵
                            PID:1068
                            • C:\Users\Admin\AppData\Local\Temp\088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe
                              "C:\Users\Admin\AppData\Local\Temp\088e431500f13ad5f96af8079b2e6704440bef6810903ce7f760336e65d7cece.exe"
                              2⤵
                              • Suspicious use of SetThreadContext
                              • Suspicious use of WriteProcessMemory
                              PID:4668
                              • C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe
                                "C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe"
                                3⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of WriteProcessMemory
                                PID:1192
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf66f71bf.bat"
                                3⤵
                                  PID:4532
                            • C:\Windows\system32\taskhostw.exe
                              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                              1⤵
                                PID:2808
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                1⤵
                                  PID:2580
                                • C:\Windows\system32\BackgroundTransferHost.exe
                                  "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                  1⤵
                                    PID:5068
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:4080
                                    • C:\Windows\system32\DllHost.exe
                                      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                      1⤵
                                        PID:4120
                                      • C:\Windows\system32\backgroundTaskHost.exe
                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                        1⤵
                                          PID:3512
                                        • C:\Windows\System32\RuntimeBroker.exe
                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                          1⤵
                                            PID:2228
                                          • C:\Windows\system32\DllHost.exe
                                            C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                            1⤵
                                              PID:2312

                                            Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Temp\tmpf66f71bf.bat

                                                    Filesize

                                                    307B

                                                    MD5

                                                    dbe25d3e3c791edfc875a32e10ce4aa0

                                                    SHA1

                                                    b6a64211d8f77e53ed837616ec0c836c649ca3d7

                                                    SHA256

                                                    f36ebf320b30979a0dea8469db3018259460bf3dfc752a40ad00269c3f1314c8

                                                    SHA512

                                                    71cb864ba1d090021a6b196d8b344ef7719f25f74e5105f530673423aa5ea7605fe5ee9604c310652899d541aec0f1dda51912b8ecea6e7d91811879508e249a

                                                  • C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe

                                                    Filesize

                                                    359KB

                                                    MD5

                                                    923cd2c76bb8b329ebba1b15ed62db67

                                                    SHA1

                                                    ae013cb3eddf179eb11f3a8f4afb1a78e7d8aaa2

                                                    SHA256

                                                    70aeaedbccfdc14fd0fde1112d557e091ee0f18a0551130377790ab50c2045f8

                                                    SHA512

                                                    0a69d68ee2d0f540e905e58352afec2d94a811638489488679fc496890226bc9ee1804e30ab1039d7cbffdfce1ef801ce1300427e62aead913f9b884962c4916

                                                  • C:\Users\Admin\AppData\Roaming\Eswapi\uwef.exe

                                                    Filesize

                                                    359KB

                                                    MD5

                                                    923cd2c76bb8b329ebba1b15ed62db67

                                                    SHA1

                                                    ae013cb3eddf179eb11f3a8f4afb1a78e7d8aaa2

                                                    SHA256

                                                    70aeaedbccfdc14fd0fde1112d557e091ee0f18a0551130377790ab50c2045f8

                                                    SHA512

                                                    0a69d68ee2d0f540e905e58352afec2d94a811638489488679fc496890226bc9ee1804e30ab1039d7cbffdfce1ef801ce1300427e62aead913f9b884962c4916

                                                  • memory/1192-140-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/1192-143-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/1192-160-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/1192-161-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/1192-141-0x00000000006F0000-0x000000000073C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4532-152-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-157-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-155-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-156-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-159-0x0000000000D00000-0x0000000000D4C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4532-154-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-153-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4532-149-0x0000000000D00000-0x0000000000D4C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4668-139-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/4668-151-0x00000000022E0000-0x000000000232C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4668-150-0x0000000000400000-0x000000000044C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4668-147-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4668-146-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4668-144-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4668-145-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4668-142-0x000000006FFF0000-0x0000000070000000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4668-132-0x0000000000400000-0x000000000045C000-memory.dmp

                                                    Filesize

                                                    368KB

                                                  • memory/4668-138-0x0000000002220000-0x000000000226C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4668-134-0x0000000000400000-0x000000000044C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/4668-133-0x0000000000400000-0x000000000044C000-memory.dmp

                                                    Filesize

                                                    304KB