Analysis

  • max time kernel
    179s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:38

General

  • Target

    93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05.exe

  • Size

    297KB

  • MD5

    75da8598ae1a3efb9b3034ed81a3bd90

  • SHA1

    01f58af975e8b80930f8bb34ad5ff584400be083

  • SHA256

    93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05

  • SHA512

    c6ad1ddd292810aa8a033396dc6daba6adbdce0f61975a95ae12e8a5561cf3c6d26bb61a2d6a96eec0fe294d22687a560d89e2767a8100ce604e122491da6e96

  • SSDEEP

    6144:sD+nLXGfNWs0F0gYkWgrf2F334WwymP1bdMj1VoE:sD6XwWs0F0gYkWgSF334NP1bdMXX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3564
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:4536
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        1⤵
          PID:4952
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
          1⤵
            PID:3488
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:4744
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3792
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3652
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3492
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3400
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                      1⤵
                        PID:3228
                      • C:\Windows\Explorer.EXE
                        C:\Windows\Explorer.EXE
                        1⤵
                          PID:1032
                          • C:\Users\Admin\AppData\Local\Temp\93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05.exe
                            "C:\Users\Admin\AppData\Local\Temp\93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05.exe"
                            2⤵
                            • Enumerates connected drives
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1740
                            • C:\Users\Admin\AppData\Local\Temp\93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05.exe
                              C:\Users\Admin\AppData\Local\Temp\93b3fabbc4071e8ca2d781d02acee81670982038dbc0922aba1aa56d7eb13d05.exe
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4216
                              • C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                "C:\Users\Admin\AppData\Roaming\Siep\urocr.exe"
                                4⤵
                                • Executes dropped EXE
                                • Enumerates connected drives
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:228
                                • C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                  C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of WriteProcessMemory
                                  PID:3928
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6e1e6c71.bat"
                                4⤵
                                  PID:3504
                                  • C:\Windows\System32\Conhost.exe
                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    5⤵
                                      PID:3276
                            • C:\Windows\system32\taskhostw.exe
                              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                              1⤵
                                PID:2808
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                1⤵
                                  PID:2548
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  1⤵
                                    PID:2536
                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                    1⤵
                                      PID:4924
                                    • C:\Windows\system32\backgroundTaskHost.exe
                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                      1⤵
                                        PID:1644

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\tmp6e1e6c71.bat
                                        Filesize

                                        307B

                                        MD5

                                        c0fe1f136e22c5a2ddeef9a0b2d84347

                                        SHA1

                                        2c481b963f1380006979dacacfce1facf22fb3d0

                                        SHA256

                                        c6c9d4959f6afc968bc19a7296f3a0ca7bdadb112b091e929b42e353125585ce

                                        SHA512

                                        394b3d163649b2776a682d018f46020dd68a2fe81f5afeb845c1533d6410a1afa7b833269915ea05600feac08cb1b2c2da4ad1ad55067b42eddc379c08ac39dc

                                      • C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                        Filesize

                                        297KB

                                        MD5

                                        716a8a59b35cf1eff2bd5a821e8c73a0

                                        SHA1

                                        e04b23fa40a38361238dd08f58b106e3273d246b

                                        SHA256

                                        79c2ea79287c66592b8c33c305f1118fbae2a88066b3f07a742f7503d0bdb7a0

                                        SHA512

                                        023598f3597883f9941f2fe7b2f9bb504fec79f1ff98bb6105b63c16a9f77d134cc1870620240a52977700fcb401f0d568329268206caeb8b5ec177f95a6fee1

                                      • C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                        Filesize

                                        297KB

                                        MD5

                                        716a8a59b35cf1eff2bd5a821e8c73a0

                                        SHA1

                                        e04b23fa40a38361238dd08f58b106e3273d246b

                                        SHA256

                                        79c2ea79287c66592b8c33c305f1118fbae2a88066b3f07a742f7503d0bdb7a0

                                        SHA512

                                        023598f3597883f9941f2fe7b2f9bb504fec79f1ff98bb6105b63c16a9f77d134cc1870620240a52977700fcb401f0d568329268206caeb8b5ec177f95a6fee1

                                      • C:\Users\Admin\AppData\Roaming\Siep\urocr.exe
                                        Filesize

                                        297KB

                                        MD5

                                        716a8a59b35cf1eff2bd5a821e8c73a0

                                        SHA1

                                        e04b23fa40a38361238dd08f58b106e3273d246b

                                        SHA256

                                        79c2ea79287c66592b8c33c305f1118fbae2a88066b3f07a742f7503d0bdb7a0

                                        SHA512

                                        023598f3597883f9941f2fe7b2f9bb504fec79f1ff98bb6105b63c16a9f77d134cc1870620240a52977700fcb401f0d568329268206caeb8b5ec177f95a6fee1

                                      • memory/228-137-0x0000000000000000-mapping.dmp
                                      • memory/1740-135-0x0000000005EA0000-0x0000000005EA4000-memory.dmp
                                        Filesize

                                        16KB

                                      • memory/3504-146-0x0000000000000000-mapping.dmp
                                      • memory/3504-148-0x0000000000990000-0x00000000009CB000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/3504-150-0x0000000000990000-0x00000000009CB000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/3928-140-0x0000000000000000-mapping.dmp
                                      • memory/3928-144-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/3928-151-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/4216-132-0x0000000000000000-mapping.dmp
                                      • memory/4216-136-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/4216-145-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/4216-147-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB

                                      • memory/4216-133-0x0000000000400000-0x000000000043B000-memory.dmp
                                        Filesize

                                        236KB