Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:45

General

  • Target

    6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe

  • Size

    307KB

  • MD5

    23d23e7f1a274b773003eee67dc596be

  • SHA1

    be22e91f666b0906ec2b6ec1226ad9857d465057

  • SHA256

    6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f

  • SHA512

    69d20ca99f781c0a3b75e3a800586c5dc1bbde00a61f2826ef9eaeab1619a019126fcfaf929306e3562685990f5bba4447695f3fbb01d17c391a806fc67deb34

  • SSDEEP

    6144:c2zydZlCjJW1RUpzYMDr+izzJwr1KHrECeykKTeEpSYRrc07qi7+M1GyRz:c2ydZlCjJWkFDDx15kKThPgk7+0X

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe
        "C:\Users\Admin\AppData\Local\Temp\6371b1fa50cc53e19eb562ad40b96a06625816ca78dcc12c479fcad83cdecf8f.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe
          "C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1128
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp7f1abfa4.bat"
          3⤵
          • Deletes itself
          PID:2044
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1360
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1248

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp7f1abfa4.bat

          Filesize

          307B

          MD5

          737a158236ae10c69cfb6672602d2fba

          SHA1

          700c8e88af3aebf27e472f632dc3730ca112d3cd

          SHA256

          b8a0a7aad881b0c644aac0423222426db959f66c1dfe2ef3fbd6b877aea38129

          SHA512

          d877d1e173160ab241211d0121eafc3cf1a2f7350cddae6b469fa21a232d32c8062722477f8b47b8cc215282a03d7d2be494fd9468a2ce2e0673a26a9b19b5da

        • C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe

          Filesize

          307KB

          MD5

          48bb48d7247742d79aa72e67ba5c6131

          SHA1

          2d262b15974dd1b9dd46cb159b7da56f5cc86e07

          SHA256

          b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154

          SHA512

          ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba

        • C:\Users\Admin\AppData\Roaming\Tavufu\vata.exe

          Filesize

          307KB

          MD5

          48bb48d7247742d79aa72e67ba5c6131

          SHA1

          2d262b15974dd1b9dd46cb159b7da56f5cc86e07

          SHA256

          b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154

          SHA512

          ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba

        • \Users\Admin\AppData\Roaming\Tavufu\vata.exe

          Filesize

          307KB

          MD5

          48bb48d7247742d79aa72e67ba5c6131

          SHA1

          2d262b15974dd1b9dd46cb159b7da56f5cc86e07

          SHA256

          b53f0069dfc3ba2cc47be7b55275a76245586c1ada6d5c5d678c494b01208154

          SHA512

          ec9ae6b5c876d944f4ce076131e7041e69ea1c8dcc2d1fa5047cb052e27366d461f3613eb5461ffbb951d48bfe1c16d3fbae7392a0c9cd8015a2bcab217d3dba

        • memory/1128-104-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1128-59-0x0000000000000000-mapping.dmp

        • memory/1128-105-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1128-64-0x00000000010D0000-0x0000000001120000-memory.dmp

          Filesize

          320KB

        • memory/1128-106-0x00000000010D0000-0x0000000001120000-memory.dmp

          Filesize

          320KB

        • memory/1248-71-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1248-66-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1248-68-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1248-70-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1248-69-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1360-77-0x00000000002B0000-0x00000000002F4000-memory.dmp

          Filesize

          272KB

        • memory/1392-80-0x0000000002670000-0x00000000026B4000-memory.dmp

          Filesize

          272KB

        • memory/1392-83-0x0000000002670000-0x00000000026B4000-memory.dmp

          Filesize

          272KB

        • memory/1392-81-0x0000000002670000-0x00000000026B4000-memory.dmp

          Filesize

          272KB

        • memory/1392-82-0x0000000002670000-0x00000000026B4000-memory.dmp

          Filesize

          272KB

        • memory/1448-99-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1448-100-0x00000000001A0000-0x00000000001E4000-memory.dmp

          Filesize

          272KB

        • memory/1448-87-0x00000000001A0000-0x00000000001E4000-memory.dmp

          Filesize

          272KB

        • memory/1448-86-0x00000000001A0000-0x00000000001E4000-memory.dmp

          Filesize

          272KB

        • memory/1448-89-0x00000000001A0000-0x00000000001E4000-memory.dmp

          Filesize

          272KB

        • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

          Filesize

          8KB

        • memory/1448-55-0x0000000000F80000-0x0000000000FD0000-memory.dmp

          Filesize

          320KB

        • memory/1448-57-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1448-56-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1448-62-0x000000007EF60000-0x000000007EFA4000-memory.dmp

          Filesize

          272KB

        • memory/1448-88-0x00000000001A0000-0x00000000001E4000-memory.dmp

          Filesize

          272KB

        • memory/1448-98-0x0000000000F80000-0x0000000000FD0000-memory.dmp

          Filesize

          320KB

        • memory/1448-63-0x00000000001A0000-0x00000000001F0000-memory.dmp

          Filesize

          320KB

        • memory/2044-97-0x00000000000671E6-mapping.dmp

        • memory/2044-95-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/2044-103-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/2044-96-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/2044-92-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/2044-94-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB