Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 09:46

General

  • Target

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe

  • Size

    32KB

  • MD5

    ebd4ff5dd3b586aa279899a33dbc093b

  • SHA1

    f861dc94a155c8a3d7952c79eca146ef61123c39

  • SHA256

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e

  • SHA512

    973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6

  • SSDEEP

    192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /f /im dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im dl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c explorer C:\users\public\windows\dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\SysWOW64\explorer.exe
        explorer C:\users\public\windows\dl.exe
        3⤵
          PID:832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1708
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1764
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
        2⤵
          PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c attrib +h +r +s c:\Users\public\windows
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +r +s c:\Users\public\windows
            3⤵
            • Views/modifies file attributes
            PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /f /im file.sys
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im file.sys
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:808
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
          2⤵
            PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
            2⤵
              PID:1536
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
              2⤵
                PID:1332
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                2⤵
                  PID:968
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                  2⤵
                    PID:1268
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                    2⤵
                      PID:1360
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                      2⤵
                        PID:1956
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                        2⤵
                          PID:1280
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                          2⤵
                            PID:1712
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                            2⤵
                              PID:1504
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                              2⤵
                                PID:620
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                2⤵
                                  PID:488
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                  2⤵
                                    PID:1056
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                    2⤵
                                      PID:1492
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                      2⤵
                                        PID:744
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                        2⤵
                                          PID:1944
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                          2⤵
                                            PID:2032
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                            2⤵
                                              PID:1664
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                              2⤵
                                                PID:1560
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                2⤵
                                                  PID:772
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                  2⤵
                                                    PID:1684
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                    2⤵
                                                      PID:1576
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                      2⤵
                                                        PID:552
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                        2⤵
                                                          PID:1612
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                          2⤵
                                                            PID:1180
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                            2⤵
                                                              PID:1648
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                              2⤵
                                                                PID:1420
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                2⤵
                                                                  PID:1184
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                  2⤵
                                                                    PID:808
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                    2⤵
                                                                      PID:1332
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                      2⤵
                                                                        PID:936
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                        2⤵
                                                                          PID:1408
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                          2⤵
                                                                            PID:1700
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                              3⤵
                                                                              • Adds Run key to start application
                                                                              PID:988
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                            2⤵
                                                                              PID:944
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                                3⤵
                                                                                • Adds Run key to start application
                                                                                PID:856
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
                                                                              2⤵
                                                                                PID:1616
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c attrib +h +r +s c:\Users\public\windows
                                                                                2⤵
                                                                                  PID:1340
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib +h +r +s c:\Users\public\windows
                                                                                    3⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:1648
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c taskkill /f /im file.sys
                                                                                  2⤵
                                                                                    PID:1180
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /f /im file.sys
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:460
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
                                                                                    2⤵
                                                                                      PID:1800
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
                                                                                      2⤵
                                                                                        PID:1964
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
                                                                                        2⤵
                                                                                          PID:1592
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                                                                                          2⤵
                                                                                            PID:268
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                                                                                            2⤵
                                                                                              PID:608
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                                                                                              2⤵
                                                                                                PID:1980
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                2⤵
                                                                                                  PID:1660
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                  2⤵
                                                                                                    PID:1944
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                    2⤵
                                                                                                      PID:1408
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                      2⤵
                                                                                                        PID:1580
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                        2⤵
                                                                                                          PID:1444
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                          2⤵
                                                                                                            PID:552
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                            2⤵
                                                                                                              PID:988
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                              2⤵
                                                                                                                PID:820
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                2⤵
                                                                                                                  PID:1664
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                  2⤵
                                                                                                                    PID:1784
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                    2⤵
                                                                                                                      PID:1612
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                      2⤵
                                                                                                                        PID:328
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                        2⤵
                                                                                                                          PID:268
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                          2⤵
                                                                                                                            PID:880
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                            2⤵
                                                                                                                              PID:1764
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                              2⤵
                                                                                                                                PID:1064
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                2⤵
                                                                                                                                  PID:1632
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                  2⤵
                                                                                                                                    PID:1424
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                    2⤵
                                                                                                                                      PID:1948
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                      2⤵
                                                                                                                                        PID:1980
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                                                                                        2⤵
                                                                                                                                          PID:436
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                          2⤵
                                                                                                                                            PID:1660
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                                                                                            2⤵
                                                                                                                                              PID:1516
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                                                                                              2⤵
                                                                                                                                                PID:1664
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                                                                                                2⤵
                                                                                                                                                  PID:1932
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1532
                                                                                                                                                • C:\Windows\explorer.exe
                                                                                                                                                  C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                  • Modifies Internet Explorer settings
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  PID:1804

                                                                                                                                                Network

                                                                                                                                                MITRE ATT&CK Enterprise v6

                                                                                                                                                Replay Monitor

                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                Downloads

                                                                                                                                                • memory/832-69-0x00000000757B1000-0x00000000757B3000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/832-70-0x00000000744B1000-0x00000000744B3000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/1804-99-0x000007FEFB851000-0x000007FEFB853000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/1804-100-0x00000000039C0000-0x00000000039D0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB