Analysis

  • max time kernel
    149s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:18

General

  • Target

    5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe

  • Size

    452KB

  • MD5

    a7199d2ff40258ac7427ce9b513fe3fe

  • SHA1

    a9eecc7ad31d4d57cb6ff57b1588f18e4830bcc2

  • SHA256

    5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e

  • SHA512

    26a5d17a002f5c4b5c6019d29d4c45516a204df86f2c9d1f5495219ab6baacd77643075915a839053058cbbd3ed547c43cd9228698e31975536144e0da4df8ae

  • SSDEEP

    12288:rj93DcSMTXXAi7bCqoEozFGPCUo0G9o5/AWZn+j:9TXri7bNoFzwPCUor9KVEj

Malware Config

Signatures

  • Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1200
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1244
          • C:\Users\Admin\AppData\Local\Temp\5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe
            "C:\Users\Admin\AppData\Local\Temp\5498945d745d09948fd4328f7da6d71ae442e0e80242dd5f66a247e30d40a22e.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe
              "C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe"
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Adds Run key to start application
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:620
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:320
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:664
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:568
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:1320
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:888
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:1864
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:1420
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:1416
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:608
              • C:\Windows\system32\bcdedit.exe
                bcdedit.exe -set TESTSIGNING ON
                4⤵
                • Modifies boot configuration data using bcdedit
                PID:292
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QOT771F.bat"
              3⤵
              • Deletes itself
              PID:1668
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "1626924549-421475575-1299951291-2765498671666563903-1687036756-16512369821857716997"
          1⤵
            PID:1732
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            1⤵
              PID:1948
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x1
              1⤵
                PID:796

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe

                Filesize

                452KB

                MD5

                19fb06e3c09563f1293d8afc87e9ae54

                SHA1

                6da3550f0ff28d3e4c069cf63837dda324c1ca2f

                SHA256

                3c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb

                SHA512

                8f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6

              • C:\Users\Admin\AppData\Local\Temp\Ohijru\koti.exe

                Filesize

                452KB

                MD5

                19fb06e3c09563f1293d8afc87e9ae54

                SHA1

                6da3550f0ff28d3e4c069cf63837dda324c1ca2f

                SHA256

                3c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb

                SHA512

                8f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6

              • C:\Users\Admin\AppData\Local\Temp\QOT771F.bat

                Filesize

                280B

                MD5

                fcc788819614660fd1c4277c0e0458a8

                SHA1

                34daeef7f35deb374c88ab99f46bd7f6a082997a

                SHA256

                24d66544138baddce4b8cf8d368efa985badba3c6be28c538d90df7fa8cb6efe

                SHA512

                df789cb51683608f6c39a06cf05145a5bd2ddf9b35d2ae484f6455b490639137f9a5d077a482668ceeb2a86aac5a1d8261d64f55fc262d53d0d2319d3667777e

              • \Users\Admin\AppData\Local\Temp\Ohijru\koti.exe

                Filesize

                452KB

                MD5

                19fb06e3c09563f1293d8afc87e9ae54

                SHA1

                6da3550f0ff28d3e4c069cf63837dda324c1ca2f

                SHA256

                3c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb

                SHA512

                8f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6

              • \Users\Admin\AppData\Local\Temp\Ohijru\koti.exe

                Filesize

                452KB

                MD5

                19fb06e3c09563f1293d8afc87e9ae54

                SHA1

                6da3550f0ff28d3e4c069cf63837dda324c1ca2f

                SHA256

                3c16dc649ffd12bb7a1c40ca8e8be5d6407a2eb52fddd212bd46f24a830fbbfb

                SHA512

                8f197610a6886987354f30f7279a995c536dff961649daa3df42e0267fd2a99aae74588eb296a929d9ce30d4073a063bb719bff8decf633d480b60b053aa9eb6

              • memory/292-73-0x0000000000000000-mapping.dmp

              • memory/320-65-0x0000000000000000-mapping.dmp

              • memory/568-67-0x0000000000000000-mapping.dmp

              • memory/608-74-0x0000000000000000-mapping.dmp

              • memory/620-59-0x0000000000000000-mapping.dmp

              • memory/620-132-0x0000000000400000-0x0000000000474000-memory.dmp

                Filesize

                464KB

              • memory/620-63-0x0000000000400000-0x0000000000474000-memory.dmp

                Filesize

                464KB

              • memory/620-75-0x0000000000310000-0x0000000000316000-memory.dmp

                Filesize

                24KB

              • memory/664-66-0x0000000000000000-mapping.dmp

              • memory/888-69-0x0000000000000000-mapping.dmp

              • memory/1120-80-0x0000000000220000-0x000000000028E000-memory.dmp

                Filesize

                440KB

              • memory/1120-81-0x0000000000220000-0x000000000028E000-memory.dmp

                Filesize

                440KB

              • memory/1120-78-0x0000000000220000-0x000000000028E000-memory.dmp

                Filesize

                440KB

              • memory/1120-76-0x0000000000220000-0x000000000028E000-memory.dmp

                Filesize

                440KB

              • memory/1120-79-0x0000000000220000-0x000000000028E000-memory.dmp

                Filesize

                440KB

              • memory/1200-84-0x0000000001D70000-0x0000000001DDE000-memory.dmp

                Filesize

                440KB

              • memory/1200-85-0x0000000001D70000-0x0000000001DDE000-memory.dmp

                Filesize

                440KB

              • memory/1200-86-0x0000000001D70000-0x0000000001DDE000-memory.dmp

                Filesize

                440KB

              • memory/1200-87-0x0000000001D70000-0x0000000001DDE000-memory.dmp

                Filesize

                440KB

              • memory/1244-93-0x0000000002B00000-0x0000000002B6E000-memory.dmp

                Filesize

                440KB

              • memory/1244-91-0x0000000002B00000-0x0000000002B6E000-memory.dmp

                Filesize

                440KB

              • memory/1244-90-0x0000000002B00000-0x0000000002B6E000-memory.dmp

                Filesize

                440KB

              • memory/1244-92-0x0000000002B00000-0x0000000002B6E000-memory.dmp

                Filesize

                440KB

              • memory/1320-68-0x0000000000000000-mapping.dmp

              • memory/1416-72-0x0000000000000000-mapping.dmp

              • memory/1420-71-0x0000000000000000-mapping.dmp

              • memory/1636-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

                Filesize

                8KB

              • memory/1636-55-0x0000000000580000-0x00000000005C4000-memory.dmp

                Filesize

                272KB

              • memory/1636-64-0x0000000000400000-0x0000000000474000-memory.dmp

                Filesize

                464KB

              • memory/1636-96-0x0000000002660000-0x00000000026CE000-memory.dmp

                Filesize

                440KB

              • memory/1636-97-0x0000000002660000-0x00000000026CE000-memory.dmp

                Filesize

                440KB

              • memory/1636-98-0x0000000002660000-0x00000000026CE000-memory.dmp

                Filesize

                440KB

              • memory/1636-99-0x0000000002660000-0x00000000026CE000-memory.dmp

                Filesize

                440KB

              • memory/1636-103-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-102-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-101-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-100-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-104-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1636-106-0x0000000002660000-0x00000000026CE000-memory.dmp

                Filesize

                440KB

              • memory/1636-56-0x0000000000400000-0x0000000000474000-memory.dmp

                Filesize

                464KB

              • memory/1636-115-0x0000000000400000-0x0000000000474000-memory.dmp

                Filesize

                464KB

              • memory/1668-109-0x00000000000A0000-0x000000000010E000-memory.dmp

                Filesize

                440KB

              • memory/1668-121-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-114-0x00000000000E02ED-mapping.dmp

              • memory/1668-112-0x00000000000A0000-0x000000000010E000-memory.dmp

                Filesize

                440KB

              • memory/1668-117-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-118-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-119-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-120-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-122-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-113-0x00000000000A0000-0x000000000010E000-memory.dmp

                Filesize

                440KB

              • memory/1668-123-0x000000006FFF0000-0x0000000070000000-memory.dmp

                Filesize

                64KB

              • memory/1668-124-0x00000000000A0000-0x000000000010E000-memory.dmp

                Filesize

                440KB

              • memory/1668-111-0x00000000000A0000-0x000000000010E000-memory.dmp

                Filesize

                440KB

              • memory/1732-128-0x00000000000D0000-0x000000000013E000-memory.dmp

                Filesize

                440KB

              • memory/1732-129-0x00000000000D0000-0x000000000013E000-memory.dmp

                Filesize

                440KB

              • memory/1732-130-0x00000000000D0000-0x000000000013E000-memory.dmp

                Filesize

                440KB

              • memory/1732-127-0x00000000000D0000-0x000000000013E000-memory.dmp

                Filesize

                440KB

              • memory/1864-70-0x0000000000000000-mapping.dmp

              • memory/1948-133-0x000007FEFB851000-0x000007FEFB853000-memory.dmp

                Filesize

                8KB