Analysis

  • max time kernel
    186s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:31

General

  • Target

    3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe

  • Size

    319KB

  • MD5

    f81c2a86407179eb7c6637c921997e01

  • SHA1

    e9a0ba76ae861e94738bf52250efbedf819ee3d0

  • SHA256

    3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490

  • SHA512

    38fa149cb61cff212dc13f9b41f0d5e69de1cd66ce4daada47a14daf5e3ea36fce07f9251cf085ac63b980f567af9634e3d70f312a5afc05fafe8c5c6529cbc5

  • SSDEEP

    6144:+XQddP4+FTexgczIapcDwCfW6Pg3asNa4V0+:+XQdNdczDOwQWioZ7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe
        "C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe
          "C:\Users\Admin\AppData\Local\Temp\3fb419b75bba814ed51b84d5dce7be293c93cc2b9f801e2116a72eec504fd490.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe
            "C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe
              "C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                6⤵
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:692
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp73afaea6.bat"
            4⤵
            • Deletes itself
            PID:1484
    • C:\Program Files\Windows Mail\WinMail.exe
      "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
      1⤵
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp73afaea6.bat

      Filesize

      307B

      MD5

      1a25ce09a8b74ef9f76dfc06a8b2b367

      SHA1

      2b3212fd7675a190529176c02ae791b570eb9469

      SHA256

      37930005ebce7815c0fd525f3066d211ab4eb31523ae06ba37f5df8d01c3d9f2

      SHA512

      c1ea7e391488a7e4697410571fac47da92a6ec79b10ddfbc6159aeb24acf7f957b8e4065580ab8a4ff218fe4157ceddadd1dd6fbc66e6c1f2cf51c699fda03e3

    • C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe

      Filesize

      319KB

      MD5

      8ccacd1a3bfa9a3846c6c726769e6fad

      SHA1

      1e6d433f0983ce00e9eaf6afef4a1e25bcb488f1

      SHA256

      56217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279

      SHA512

      62938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479

    • C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe

      Filesize

      319KB

      MD5

      8ccacd1a3bfa9a3846c6c726769e6fad

      SHA1

      1e6d433f0983ce00e9eaf6afef4a1e25bcb488f1

      SHA256

      56217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279

      SHA512

      62938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479

    • C:\Users\Admin\AppData\Roaming\Oqte\ukma.exe

      Filesize

      319KB

      MD5

      8ccacd1a3bfa9a3846c6c726769e6fad

      SHA1

      1e6d433f0983ce00e9eaf6afef4a1e25bcb488f1

      SHA256

      56217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279

      SHA512

      62938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479

    • \Users\Admin\AppData\Roaming\Oqte\ukma.exe

      Filesize

      319KB

      MD5

      8ccacd1a3bfa9a3846c6c726769e6fad

      SHA1

      1e6d433f0983ce00e9eaf6afef4a1e25bcb488f1

      SHA256

      56217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279

      SHA512

      62938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479

    • \Users\Admin\AppData\Roaming\Oqte\ukma.exe

      Filesize

      319KB

      MD5

      8ccacd1a3bfa9a3846c6c726769e6fad

      SHA1

      1e6d433f0983ce00e9eaf6afef4a1e25bcb488f1

      SHA256

      56217198c9368f05bfcd0f9b2897ce4402ebdfd25235b0b1dfe34d79a1636279

      SHA512

      62938a0f5a1be84867e8b65412e1af79bd691835fb116e073f621a74cd2b7138293cc4dc5d5e17ebe2aaa73d62bdb3b7c0873de78668e3ebfd6c1d0e305ee479

    • memory/692-99-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/692-98-0x0000000074741000-0x0000000074743000-memory.dmp

      Filesize

      8KB

    • memory/692-94-0x0000000000000000-mapping.dmp

    • memory/960-59-0x00000000003B0000-0x00000000003CD000-memory.dmp

      Filesize

      116KB

    • memory/1076-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-62-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-70-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-55-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-68-0x0000000075D01000-0x0000000075D03000-memory.dmp

      Filesize

      8KB

    • memory/1076-54-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-75-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-64-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-57-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-65-0x0000000000412DB6-mapping.dmp

    • memory/1076-60-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-69-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1076-95-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1328-100-0x000007FEFB971000-0x000007FEFB973000-memory.dmp

      Filesize

      8KB

    • memory/1328-101-0x000007FEF69A1000-0x000007FEF69A3000-memory.dmp

      Filesize

      8KB

    • memory/1328-102-0x0000000000250000-0x0000000000260000-memory.dmp

      Filesize

      64KB

    • memory/1328-108-0x0000000002130000-0x0000000002140000-memory.dmp

      Filesize

      64KB

    • memory/1484-93-0x0000000000000000-mapping.dmp

    • memory/1500-92-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1500-87-0x0000000000412DB6-mapping.dmp

    • memory/1500-114-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1972-73-0x0000000000000000-mapping.dmp