Analysis

  • max time kernel
    150s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:45

General

  • Target

    39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe

  • Size

    357KB

  • MD5

    2f802d2af925bf481342e2930a0a1bbc

  • SHA1

    357dce5f3fed2d67ab6eb51a3c971f6cf5397d89

  • SHA256

    39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1

  • SHA512

    64786ee942f491bff598b252e67df93ffff8a4cec87ab89e0d70de4533fe4519410e15826369ebf682f8ec837ffebd18547120bc7af45f1a1efd8298d9fd6aa2

  • SSDEEP

    6144:C4//qpBmFHs3czyOxW8RjSqjAvzxCaQHkRw0ZjOEd4xEtpzbpk:C46pBiHs3czfxW8B7jAv1CaXuIGGb2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe
        "C:\Users\Admin\AppData\Local\Temp\39878155e060d6e9d159965fcbb3395e7d9cca3f17ff0164fbc22863e4341df1.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe
          "C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1320
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa7d51ad6.bat"
          3⤵
          • Deletes itself
          PID:308
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1188
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpa7d51ad6.bat
          Filesize

          307B

          MD5

          2d6087d31e84aea8fe87dbbcb5219856

          SHA1

          c64e391c7ff984356a4b23275aefee9391c0b66a

          SHA256

          2b1ae0e7cf0fa906725e8531373dfbbd4a5f1ca5e97f8c944fec83fcc100c976

          SHA512

          c6b2330646d0a2ebfebe1e73d979083c3f0fb8bc74a1a71307eea4a0fed1824d3bf7c5f3bb285f5a559d83c470d6c43e0c9e87fb9422b2b7741e8a2795f018f7

        • C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe
          Filesize

          357KB

          MD5

          bb4108bd9bb779e4376a1e797c97d692

          SHA1

          9b7dde23a27fda0e2dc4db9c3461f51dd99be6e9

          SHA256

          7978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452

          SHA512

          76e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35

        • C:\Users\Admin\AppData\Roaming\Kieg\ewal.exe
          Filesize

          357KB

          MD5

          bb4108bd9bb779e4376a1e797c97d692

          SHA1

          9b7dde23a27fda0e2dc4db9c3461f51dd99be6e9

          SHA256

          7978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452

          SHA512

          76e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35

        • \Users\Admin\AppData\Roaming\Kieg\ewal.exe
          Filesize

          357KB

          MD5

          bb4108bd9bb779e4376a1e797c97d692

          SHA1

          9b7dde23a27fda0e2dc4db9c3461f51dd99be6e9

          SHA256

          7978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452

          SHA512

          76e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35

        • \Users\Admin\AppData\Roaming\Kieg\ewal.exe
          Filesize

          357KB

          MD5

          bb4108bd9bb779e4376a1e797c97d692

          SHA1

          9b7dde23a27fda0e2dc4db9c3461f51dd99be6e9

          SHA256

          7978d6cff34caca0f8a005f249261e24c8702148bde1076f7d10d261e50df452

          SHA512

          76e06c3364295b0005b17e4b58ae34f831479cb5bdcc41e8ecb1f92612d2853a83e27278a1556e89f996a9724a498dbce423e12ba9c5ec2230bf42514725eb35

        • memory/308-100-0x0000000000050000-0x0000000000094000-memory.dmp
          Filesize

          272KB

        • memory/308-105-0x0000000000050000-0x0000000000094000-memory.dmp
          Filesize

          272KB

        • memory/308-101-0x00000000000671E6-mapping.dmp
        • memory/308-98-0x0000000000050000-0x0000000000094000-memory.dmp
          Filesize

          272KB

        • memory/308-99-0x0000000000050000-0x0000000000094000-memory.dmp
          Filesize

          272KB

        • memory/308-96-0x0000000000050000-0x0000000000094000-memory.dmp
          Filesize

          272KB

        • memory/1116-66-0x0000000001DB0000-0x0000000001DF4000-memory.dmp
          Filesize

          272KB

        • memory/1116-68-0x0000000001DB0000-0x0000000001DF4000-memory.dmp
          Filesize

          272KB

        • memory/1116-67-0x0000000001DB0000-0x0000000001DF4000-memory.dmp
          Filesize

          272KB

        • memory/1116-65-0x0000000001DB0000-0x0000000001DF4000-memory.dmp
          Filesize

          272KB

        • memory/1116-63-0x0000000001DB0000-0x0000000001DF4000-memory.dmp
          Filesize

          272KB

        • memory/1188-71-0x0000000000130000-0x0000000000174000-memory.dmp
          Filesize

          272KB

        • memory/1188-72-0x0000000000130000-0x0000000000174000-memory.dmp
          Filesize

          272KB

        • memory/1188-73-0x0000000000130000-0x0000000000174000-memory.dmp
          Filesize

          272KB

        • memory/1188-74-0x0000000000130000-0x0000000000174000-memory.dmp
          Filesize

          272KB

        • memory/1216-80-0x00000000029C0000-0x0000000002A04000-memory.dmp
          Filesize

          272KB

        • memory/1216-77-0x00000000029C0000-0x0000000002A04000-memory.dmp
          Filesize

          272KB

        • memory/1216-78-0x00000000029C0000-0x0000000002A04000-memory.dmp
          Filesize

          272KB

        • memory/1216-79-0x00000000029C0000-0x0000000002A04000-memory.dmp
          Filesize

          272KB

        • memory/1320-92-0x0000000000400000-0x0000000000460000-memory.dmp
          Filesize

          384KB

        • memory/1320-106-0x0000000000400000-0x0000000000460000-memory.dmp
          Filesize

          384KB

        • memory/1320-59-0x0000000000000000-mapping.dmp
        • memory/1320-91-0x00000000004D0000-0x0000000000530000-memory.dmp
          Filesize

          384KB

        • memory/1320-90-0x0000000000280000-0x00000000002C4000-memory.dmp
          Filesize

          272KB

        • memory/1832-89-0x0000000000400000-0x0000000000460000-memory.dmp
          Filesize

          384KB

        • memory/1832-93-0x00000000004F0000-0x0000000000534000-memory.dmp
          Filesize

          272KB

        • memory/1832-88-0x0000000000360000-0x00000000003C0000-memory.dmp
          Filesize

          384KB

        • memory/1832-54-0x00000000751A1000-0x00000000751A3000-memory.dmp
          Filesize

          8KB

        • memory/1832-83-0x00000000004F0000-0x0000000000534000-memory.dmp
          Filesize

          272KB

        • memory/1832-87-0x0000000000310000-0x0000000000354000-memory.dmp
          Filesize

          272KB

        • memory/1832-86-0x00000000004F0000-0x0000000000534000-memory.dmp
          Filesize

          272KB

        • memory/1832-85-0x00000000004F0000-0x0000000000534000-memory.dmp
          Filesize

          272KB

        • memory/1832-102-0x0000000000400000-0x0000000000444000-memory.dmp
          Filesize

          272KB

        • memory/1832-56-0x0000000000400000-0x0000000000444000-memory.dmp
          Filesize

          272KB

        • memory/1832-55-0x0000000000400000-0x0000000000444000-memory.dmp
          Filesize

          272KB

        • memory/1832-84-0x00000000004F0000-0x0000000000534000-memory.dmp
          Filesize

          272KB