Analysis

  • max time kernel
    171s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:20

General

  • Target

    b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1.exe

  • Size

    330KB

  • MD5

    c74ce3c717eb54abb4281448a86093ba

  • SHA1

    0b8ce40d3a4fe0e4511bd007d8fb94cfcbd19f32

  • SHA256

    b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1

  • SHA512

    dce195daf9aaaa4f236fb002c5ce33bbead0570d78fa2e41cf54328f93fce5a7ca8fcd28b12ec22d847b4348c15cdb695dccd3500c845325510c8f3dff6ad595

  • SSDEEP

    6144:GNut5Y66DJQLNE6AEYQmgoUVnDDaTZ/Bc1cYROZ+76:DcDJQxE61pDfVnvCZ/Bc1co6+W

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1.exe
    "C:\Users\Admin\AppData\Local\Temp\b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1.exe
      "C:\Users\Admin\AppData\Local\Temp\b2808470a527e4ea38fc8b1f27b3215666f174a263a103bc9e95624380b09cd1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe
        "C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe
          "C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          PID:864
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6248f00e.bat"
        3⤵
        • Deletes itself
        PID:1132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp6248f00e.bat
    Filesize

    307B

    MD5

    dff44610dc0e37a6b88e3c5190304470

    SHA1

    b81150cdbbb69fde113466c6f3b6381a4f6a31dc

    SHA256

    b24c6dd3caff203cf15ca91064296d9021af96b4c5fe07c30ea1672012a16aa7

    SHA512

    9a086a64d2c79d575f681a15671de4f501e4903aa33558b1765359bb41c6b2cad8ff983c4b72fa25d7042d2ca2b3164bd7dd9277194a5b3a81cbe9e6c5925a9d

  • C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe
    Filesize

    330KB

    MD5

    eee601042eb3bdd4c80ba050bc00b58d

    SHA1

    baf38b687cd65598a8f89557bdc6f6cf6ee0f0cc

    SHA256

    64855ad968265c2e824abdf2c1010beefe868039bf360fd2dccb170d764b0e11

    SHA512

    fdfe93cfac98503b4cdb067e25103fa439766b37deae1043399994acfaf7762204cba760316458ac7a9ab7f700e6c7a23065ee78d265c2123a663b5cf4bfe3bf

  • C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe
    Filesize

    330KB

    MD5

    eee601042eb3bdd4c80ba050bc00b58d

    SHA1

    baf38b687cd65598a8f89557bdc6f6cf6ee0f0cc

    SHA256

    64855ad968265c2e824abdf2c1010beefe868039bf360fd2dccb170d764b0e11

    SHA512

    fdfe93cfac98503b4cdb067e25103fa439766b37deae1043399994acfaf7762204cba760316458ac7a9ab7f700e6c7a23065ee78d265c2123a663b5cf4bfe3bf

  • C:\Users\Admin\AppData\Roaming\Evquok\akcyd.exe
    Filesize

    330KB

    MD5

    eee601042eb3bdd4c80ba050bc00b58d

    SHA1

    baf38b687cd65598a8f89557bdc6f6cf6ee0f0cc

    SHA256

    64855ad968265c2e824abdf2c1010beefe868039bf360fd2dccb170d764b0e11

    SHA512

    fdfe93cfac98503b4cdb067e25103fa439766b37deae1043399994acfaf7762204cba760316458ac7a9ab7f700e6c7a23065ee78d265c2123a663b5cf4bfe3bf

  • \Users\Admin\AppData\Roaming\Evquok\akcyd.exe
    Filesize

    330KB

    MD5

    eee601042eb3bdd4c80ba050bc00b58d

    SHA1

    baf38b687cd65598a8f89557bdc6f6cf6ee0f0cc

    SHA256

    64855ad968265c2e824abdf2c1010beefe868039bf360fd2dccb170d764b0e11

    SHA512

    fdfe93cfac98503b4cdb067e25103fa439766b37deae1043399994acfaf7762204cba760316458ac7a9ab7f700e6c7a23065ee78d265c2123a663b5cf4bfe3bf

  • memory/864-92-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/864-85-0x000000000040EADC-mapping.dmp
  • memory/1004-62-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-59-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-56-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-67-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-57-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-70-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-71-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-72-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-63-0x000000000040EADC-mapping.dmp
  • memory/1004-94-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1004-60-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/1132-93-0x0000000000000000-mapping.dmp
  • memory/1388-66-0x0000000000A26000-0x0000000000A37000-memory.dmp
    Filesize

    68KB

  • memory/1388-55-0x00000000744E0000-0x0000000074A8B000-memory.dmp
    Filesize

    5.7MB

  • memory/1388-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp
    Filesize

    8KB

  • memory/1388-69-0x0000000000A26000-0x0000000000A37000-memory.dmp
    Filesize

    68KB

  • memory/1388-68-0x00000000744E0000-0x0000000074A8B000-memory.dmp
    Filesize

    5.7MB

  • memory/1972-74-0x0000000000000000-mapping.dmp
  • memory/1972-89-0x0000000000CB6000-0x0000000000CC7000-memory.dmp
    Filesize

    68KB

  • memory/1972-88-0x0000000073F30000-0x00000000744DB000-memory.dmp
    Filesize

    5.7MB