Analysis

  • max time kernel
    143s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:29

General

  • Target

    a3fd9eac179dfe5f96cd4466c9ff1c0914f30a660b08fd91065e0b0cd68a4de9.exe

  • Size

    170KB

  • MD5

    dda8981aee97a3408462bc92458aed39

  • SHA1

    1efdfbde1119d532d6e7fb33b82c19d89b9486f4

  • SHA256

    a3fd9eac179dfe5f96cd4466c9ff1c0914f30a660b08fd91065e0b0cd68a4de9

  • SHA512

    bc6ffcf55424e3694822383885a3848ccf1cfbd83dfe747692fbdbdf5898988a1822be1f0edae01eefc3aece34392c41df21b202c2d1e4c763e64bd87055a2f3

  • SSDEEP

    3072:2O+0vRk64ySxQytIlLGgl74TS+uoyNVfsh/yLtcsOFJFwAqUFIe9W3wZ219V3BGJ:XVvRuyIuRGg5Kuo6shvsOFJFwd4QwZEE

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 18 IoCs
  • Modifies security service 2 TTPs 24 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 8 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Modifies firewall policy service
    • Modifies security service
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:460
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\a3fd9eac179dfe5f96cd4466c9ff1c0914f30a660b08fd91065e0b0cd68a4de9.exe
      "C:\Users\Admin\AppData\Local\Temp\a3fd9eac179dfe5f96cd4466c9ff1c0914f30a660b08fd91065e0b0cd68a4de9.exe"
      2⤵
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \systemroot\Installer\{8c508dde-2ce9-92e3-5b79-435a5d2d0943}\@
    Filesize

    2KB

    MD5

    6d740b93fad9f41b807f314fd6a33f35

    SHA1

    b43fa116b5da12d6a168d0bf17eb6fe0268f5bce

    SHA256

    d2a706a126e88da8f4ac52b9a501599398f4ebb2e666fcc4130d8e579a123503

    SHA512

    5ac1acad2bba4d784b34c57fd803446620a291a85279f8a4d5a8365e23bb349d3a442542fbb79e6d822ec95546fd263c6347532c39ac9c6683ffc1501f1d6b91

  • memory/460-78-0x00000000001A0000-0x00000000001AF000-memory.dmp
    Filesize

    60KB

  • memory/460-83-0x00000000001B0000-0x00000000001BF000-memory.dmp
    Filesize

    60KB

  • memory/460-82-0x0000000000190000-0x000000000019C000-memory.dmp
    Filesize

    48KB

  • memory/460-79-0x0000000000190000-0x000000000019C000-memory.dmp
    Filesize

    48KB

  • memory/460-80-0x00000000001B0000-0x00000000001BF000-memory.dmp
    Filesize

    60KB

  • memory/460-74-0x00000000001A0000-0x00000000001AF000-memory.dmp
    Filesize

    60KB

  • memory/1272-61-0x0000000002B10000-0x0000000002B1F000-memory.dmp
    Filesize

    60KB

  • memory/1272-69-0x0000000002AF0000-0x0000000002AFC000-memory.dmp
    Filesize

    48KB

  • memory/1272-67-0x0000000002B20000-0x0000000002B2F000-memory.dmp
    Filesize

    60KB

  • memory/1272-66-0x0000000002AF0000-0x0000000002AFC000-memory.dmp
    Filesize

    48KB

  • memory/1272-57-0x0000000002B10000-0x0000000002B1F000-memory.dmp
    Filesize

    60KB

  • memory/1272-65-0x0000000002B10000-0x0000000002B1F000-memory.dmp
    Filesize

    60KB

  • memory/1528-84-0x0000000000000000-mapping.dmp
  • memory/2036-68-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2036-54-0x00000000002B0000-0x00000000002E6000-memory.dmp
    Filesize

    216KB

  • memory/2036-55-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2036-56-0x00000000002B0000-0x00000000002E6000-memory.dmp
    Filesize

    216KB

  • memory/2036-85-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB