Analysis

  • max time kernel
    158s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:59

General

  • Target

    222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe

  • Size

    4.2MB

  • MD5

    133a1985c9245e363dc3f1e67f01c12e

  • SHA1

    e63b1293244252dcc4cf45f54357c171407ded4b

  • SHA256

    222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e

  • SHA512

    b80df7e6db4850ae8b72ae4544c186bc7e42b49eff242ef2da6078a18f8c8660fa6a3a3714a357dd5f37f2b9c9bad5fa2c459d999f827de7fcdbf95ebcd14084

  • SSDEEP

    98304:Zi1YKYTuBZMTNyi24y35v+RCBlsDxCrfetefq2BzdHoYK:fKYSITN24yJv+oBlMxC7etey2BWYK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe
    "C:\Users\Admin\AppData\Local\Temp\222a177ffd9a2d908e4c41f10c87123159f841550aa659c5f0e6b0d10febf32e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe
      "C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp" /SL5="$60154,3751313,57344,C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Suspicious behavior: GetForegroundWindowSpam
        PID:760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp

    Filesize

    703KB

    MD5

    8c79eb6b5599344f83dd05c96fbdbe3d

    SHA1

    6bac86cdd25e0b4fd5885d0f74d2029a7c7b70bc

    SHA256

    89b4d61fa1ab4b2ff5b8db0f1bd4845eaf33bcf9fea91760bc36514f85f452e3

    SHA512

    6667703686f01b74230a5b70ca26b1b15d043551d4abb812f3df03914f97a196b1fd32d118807e56bb1c95c0f85e81bde147290429df1dea7e0bffca5b4292aa

  • C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe

    Filesize

    3.9MB

    MD5

    1de5b2abbd68ccbae15b6fb2263544c5

    SHA1

    154457df6d678894cfe273a5d2576ba1673c0da5

    SHA256

    66c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e

    SHA512

    cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc

  • C:\Users\Admin\AppData\Local\Temp\~GMB1F2.exe

    Filesize

    3.9MB

    MD5

    1de5b2abbd68ccbae15b6fb2263544c5

    SHA1

    154457df6d678894cfe273a5d2576ba1673c0da5

    SHA256

    66c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e

    SHA512

    cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc

  • \Users\Admin\AppData\Local\Temp\is-FJP9Q.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-FJP9Q.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-IOR2H.tmp\~GMB1F2.tmp

    Filesize

    703KB

    MD5

    8c79eb6b5599344f83dd05c96fbdbe3d

    SHA1

    6bac86cdd25e0b4fd5885d0f74d2029a7c7b70bc

    SHA256

    89b4d61fa1ab4b2ff5b8db0f1bd4845eaf33bcf9fea91760bc36514f85f452e3

    SHA512

    6667703686f01b74230a5b70ca26b1b15d043551d4abb812f3df03914f97a196b1fd32d118807e56bb1c95c0f85e81bde147290429df1dea7e0bffca5b4292aa

  • \Users\Admin\AppData\Local\Temp\~GMB1F2.exe

    Filesize

    3.9MB

    MD5

    1de5b2abbd68ccbae15b6fb2263544c5

    SHA1

    154457df6d678894cfe273a5d2576ba1673c0da5

    SHA256

    66c564575b31e9f9a736535a06d678711c713dbe3b53fa1d4f892c4152a5b77e

    SHA512

    cc649d182a30aeeb4006f41f9df4ac5ed888bde317126ac25444f7eb4c2a2b2050b6f05e4be31849f95b816fec62d002bc5a6fc1e803fa254cf622d635bc13cc

  • memory/760-63-0x0000000000000000-mapping.dmp

  • memory/1772-54-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB

  • memory/2028-56-0x0000000000000000-mapping.dmp

  • memory/2028-59-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2028-65-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2028-69-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB