Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:44

General

  • Target

    dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe

  • Size

    1.6MB

  • MD5

    f693274485f1ef10524eaee98f7d6a4b

  • SHA1

    bd6a49605d9e71c97bacff6e3efadc1ef03f9320

  • SHA256

    dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

  • SHA512

    d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

  • SSDEEP

    49152:O89RVp7kcF1FgcY9XTxIplFX4xddcjkX3zRvioUikp9Q:O89RX7rFva9XTAFyMQRvtr

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
    "C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\6cc478.tmp
      >C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
        "C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /query /tn PCYac
          4⤵
            PID:432
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /tn PCYac /tr "\"C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe"" /f /sc onlogon /rl highest
            4⤵
            • Creates scheduled task(s)
            PID:624
        • C:\Users\Admin\AppData\Local\Temp\6ccba9.exe
          "C:\Users\Admin\AppData\Local\Temp\\6ccba9.exe"
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Sets service image path in registry
          • Installs/modifies Browser Helper Object
          • Maps connected drives based on registry
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:536
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\Windows\SysWOW64\wshtcpip.dll
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:616
            • C:\Windows\SysWOW64\icacls.exe
              icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:1428
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Windows\SysWOW64\takeown.exe
              takeown /f C:\Windows\SysWOW64\midimap.dll
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:1772
            • C:\Windows\SysWOW64\icacls.exe
              icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F
              5⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:756
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat
            4⤵
              PID:1048
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x250
        1⤵
          PID:1576

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Browser Extensions

        1
        T1176

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        2
        T1112

        File Permissions Modification

        1
        T1222

        Discovery

        Query Registry

        2
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        3
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6cc478.tmp
          Filesize

          1.6MB

          MD5

          f693274485f1ef10524eaee98f7d6a4b

          SHA1

          bd6a49605d9e71c97bacff6e3efadc1ef03f9320

          SHA256

          dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

          SHA512

          d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

        • C:\Users\Admin\AppData\Local\Temp\6cc478.tmp
          Filesize

          1.6MB

          MD5

          f693274485f1ef10524eaee98f7d6a4b

          SHA1

          bd6a49605d9e71c97bacff6e3efadc1ef03f9320

          SHA256

          dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

          SHA512

          d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

        • C:\Users\Admin\AppData\Local\Temp\6ccba9.exe
          Filesize

          716KB

          MD5

          7c565c9eebdd01bc69cb63dcca072fd0

          SHA1

          68e846eae6c1c2d618898b9f6e90e068dd881aa1

          SHA256

          0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

          SHA512

          7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

        • C:\Users\Admin\AppData\Local\Temp\6ccba9.exe
          Filesize

          716KB

          MD5

          7c565c9eebdd01bc69cb63dcca072fd0

          SHA1

          68e846eae6c1c2d618898b9f6e90e068dd881aa1

          SHA256

          0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

          SHA512

          7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

        • C:\Users\Admin\AppData\Local\Temp\ahnmove.bat
          Filesize

          177B

          MD5

          43972d1bc33622d6a0a5257274297004

          SHA1

          374a126c91fb62d62447f9cec708b8f67832fc56

          SHA256

          ee7cd3b09c7715599b35f3dceb7914ce5648ca54409f5aece691e2510ad17d3a

          SHA512

          44fa795f85a80c17db437b07ed71b9bc1eb1c0aa214b70a8e99811bc0b4d503b7f7f40f8bdbf0fbbb70a15b4266f553ac86c9b460d797b0b8e61e8942162c88a

        • C:\Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
          Filesize

          884KB

          MD5

          61b8a7d26292c0a5f7f882b5cedb8816

          SHA1

          14665cd44b2804172f46a0d1375c88959f72d797

          SHA256

          4a881ab330b90c611601b2b92173c201aeb036546d042421df77d9e713c1a767

          SHA512

          bda52e47b18376f7c577cd8a874da84809bdb504739fdd56ee40b92eae738c8dc54cc73243982a1104e324792d9abe1349123e2f5ffa6250a6388f81f131d62e

        • \Users\Admin\AppData\Local\Temp\6cc478.tmp
          Filesize

          1.6MB

          MD5

          f693274485f1ef10524eaee98f7d6a4b

          SHA1

          bd6a49605d9e71c97bacff6e3efadc1ef03f9320

          SHA256

          dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

          SHA512

          d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

        • \Users\Admin\AppData\Local\Temp\6cc478.tmp
          Filesize

          1.6MB

          MD5

          f693274485f1ef10524eaee98f7d6a4b

          SHA1

          bd6a49605d9e71c97bacff6e3efadc1ef03f9320

          SHA256

          dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1

          SHA512

          d810dfebebb55f3632f8ccb47c843c5ffa869a994ceb34d69673835da921f3a45161fde38d978180c8c12300bc25e27b4469427aebaee22b4a6e31978a650bc2

        • \Users\Admin\AppData\Local\Temp\6ccba9.exe
          Filesize

          716KB

          MD5

          7c565c9eebdd01bc69cb63dcca072fd0

          SHA1

          68e846eae6c1c2d618898b9f6e90e068dd881aa1

          SHA256

          0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

          SHA512

          7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

        • \Users\Admin\AppData\Local\Temp\6ccba9.exe
          Filesize

          716KB

          MD5

          7c565c9eebdd01bc69cb63dcca072fd0

          SHA1

          68e846eae6c1c2d618898b9f6e90e068dd881aa1

          SHA256

          0eef7da0777dd1f80375f64a2a422c91633242905567cc4bbf4869aa7507be2a

          SHA512

          7b113df19012d979cfac521ddae8125687bb1a9548614fb3a77db6ab3e6a453ff3dfd6bbee88e8befd51d4dc2f893233e42221bb2238bd3da2b54c7d25a5cdfb

        • \Users\Admin\AppData\Local\Temp\dc322672a1f1879fee8bc8e67c8e3f2a02fe79f7c56eb24a05a6433dd2083cd1.exe
          Filesize

          884KB

          MD5

          61b8a7d26292c0a5f7f882b5cedb8816

          SHA1

          14665cd44b2804172f46a0d1375c88959f72d797

          SHA256

          4a881ab330b90c611601b2b92173c201aeb036546d042421df77d9e713c1a767

          SHA512

          bda52e47b18376f7c577cd8a874da84809bdb504739fdd56ee40b92eae738c8dc54cc73243982a1104e324792d9abe1349123e2f5ffa6250a6388f81f131d62e

        • memory/432-64-0x0000000000000000-mapping.dmp
        • memory/536-72-0x0000000000220000-0x0000000000240000-memory.dmp
          Filesize

          128KB

        • memory/536-85-0x0000000001000000-0x0000000001BC7000-memory.dmp
          Filesize

          11.8MB

        • memory/536-67-0x0000000000000000-mapping.dmp
        • memory/536-75-0x0000000000220000-0x0000000000240000-memory.dmp
          Filesize

          128KB

        • memory/536-74-0x0000000001000000-0x0000000001BC7000-memory.dmp
          Filesize

          11.8MB

        • memory/584-61-0x0000000000000000-mapping.dmp
        • memory/584-73-0x0000000000400000-0x0000000000806000-memory.dmp
          Filesize

          4.0MB

        • memory/584-63-0x0000000075BE1000-0x0000000075BE3000-memory.dmp
          Filesize

          8KB

        • memory/616-78-0x0000000000000000-mapping.dmp
        • memory/624-70-0x0000000000000000-mapping.dmp
        • memory/756-82-0x0000000000000000-mapping.dmp
        • memory/884-77-0x0000000000000000-mapping.dmp
        • memory/1048-83-0x0000000000000000-mapping.dmp
        • memory/1188-69-0x0000000000400000-0x000000000040C000-memory.dmp
          Filesize

          48KB

        • memory/1188-56-0x0000000000000000-mapping.dmp
        • memory/1428-79-0x0000000000000000-mapping.dmp
        • memory/1648-57-0x0000000000400000-0x000000000040C000-memory.dmp
          Filesize

          48KB

        • memory/1704-80-0x0000000000000000-mapping.dmp
        • memory/1772-81-0x0000000000000000-mapping.dmp