Analysis

  • max time kernel
    200s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:13

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    4fe8dcd05222282de480bdafea6aba1f

  • SHA1

    759daa63a30ed49ffbf9a0193d84a1cdbe1222fd

  • SHA256

    7d6cfc8c6d71c9ae06ec9774d5ccc0fc9243dc326e02fc4e383cfe2805bb51a5

  • SHA512

    33cb600e6011bd0c1b4839943dc04e0811206f217a80f80368e00003ba67207bf9d1988502c84ec0b32291e4b8ab105be2c850899608fe23a18fea0664558ee2

  • SSDEEP

    24576:8dxuLNNc/bZzuFVwtnXNff8VXhcjwJScM7N:ExuZNcFzuMtdkRcj+F6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4548
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost kajdkfjiwueriuiwjedkfmsnfvkajksdjfvopqeirjgfiowe
      2⤵
        PID:5024
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Chaos.sldm & ping -n 5 localhost
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:380
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell get-process avastui
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3620
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell get-process avgui
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1708
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^186324320118119570326051194996969004524735423858363919713624054535922606$" Laura.sldm
            4⤵
              PID:2892
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fingering.exe.pif
              Fingering.exe.pif p
              4⤵
              • Executes dropped EXE
              PID:3596

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        Filesize

        1KB

        MD5

        def65711d78669d7f8e69313be4acf2e

        SHA1

        6522ebf1de09eeb981e270bd95114bc69a49cda6

        SHA256

        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

        SHA512

        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        18KB

        MD5

        a7971ef7f34ad9ff94eeef799c1d14e3

        SHA1

        67548dc46e92b5683ffc72f811d36928d0961dd0

        SHA256

        63570ea08f4d2a41af077244a54097121dd0c6ef711118ff86b7f9f20a1900e3

        SHA512

        0c39c81b7047ca625e0f2c016162bf700e2c0a4aee871267ca3b487f950aa665a41ee0fd824e5f6c3be6ff8715beb9b147eb001bf8b4909875d3cc403c9a1efe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chaos.sldm
        Filesize

        11KB

        MD5

        766cd31bc50af9191db198b9d9cbce21

        SHA1

        17e68a47d9b3047f45ee131939a26e61d40be489

        SHA256

        11d2e04123587d79920d251e77d93ec63c31dbdd851fb83338ccae702abf4b9e

        SHA512

        bc192b93130d20b3e977afefd396440d8d5b9f0810072ec7b49345d7fc37aef96e765637cbca1bd634b001dbc5ec962164032d6ebeb1635066e925c7f310294d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fingering.exe.pif
        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Laura.sldm
        Filesize

        872KB

        MD5

        d5cdf1b70132decc8e666ebac1ec6f4e

        SHA1

        d33bf8800a42c0b2296af81d845e0781995561ae

        SHA256

        a031e9c50ee8c2d970361fd95eece7bee539c687d856276dd653df6bb47f7838

        SHA512

        5ee87f6d9ad1954620e9d7874b5b3f4d8f3acbd0154c8f2778158821fad3b2cced7b66dfc09a4618236ee2a0d2b22997159938fe9b00959a5bc63eef13b40084

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Washington.sldm
        Filesize

        870KB

        MD5

        abdce2f6477de773c615aa30af891947

        SHA1

        eeaf88372316b85f1a27f8f5bc32aa1516e89ff5

        SHA256

        cef22e6487839bb15df2efbdfdf2ea4009c0f5c176e515f8c018ae63bb1324b1

        SHA512

        25f586a69eed0f65d69e5abb62a1d4c792c9b67620825853ea53f7c4c55d9adfd141a9443f6efff271b58cec9e77176c04ac6d4b227271dbbac9fec68e48b579

      • memory/380-133-0x0000000000000000-mapping.dmp
      • memory/1708-147-0x0000000000000000-mapping.dmp
      • memory/2892-150-0x0000000000000000-mapping.dmp
      • memory/3596-153-0x0000000000000000-mapping.dmp
      • memory/3620-137-0x0000000002190000-0x00000000021C6000-memory.dmp
        Filesize

        216KB

      • memory/3620-143-0x0000000005F40000-0x0000000005FD6000-memory.dmp
        Filesize

        600KB

      • memory/3620-144-0x0000000000690000-0x00000000006AA000-memory.dmp
        Filesize

        104KB

      • memory/3620-145-0x0000000005DA0000-0x0000000005DC2000-memory.dmp
        Filesize

        136KB

      • memory/3620-146-0x0000000007050000-0x00000000075F4000-memory.dmp
        Filesize

        5.6MB

      • memory/3620-142-0x0000000005A60000-0x0000000005A7E000-memory.dmp
        Filesize

        120KB

      • memory/3620-141-0x00000000053B0000-0x0000000005416000-memory.dmp
        Filesize

        408KB

      • memory/3620-140-0x0000000005290000-0x00000000052F6000-memory.dmp
        Filesize

        408KB

      • memory/3620-139-0x0000000004BA0000-0x0000000004BC2000-memory.dmp
        Filesize

        136KB

      • memory/3620-138-0x0000000004BF0000-0x0000000005218000-memory.dmp
        Filesize

        6.2MB

      • memory/3620-136-0x0000000000000000-mapping.dmp
      • memory/5020-135-0x0000000000000000-mapping.dmp
      • memory/5024-132-0x0000000000000000-mapping.dmp