Analysis

  • max time kernel
    42s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:52

General

  • Target

    cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe

  • Size

    99KB

  • MD5

    01a7523ac7935209ab4fe8e7cf5929f3

  • SHA1

    1c51e72487a7a72a8edc494e4785586523d54554

  • SHA256

    cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd

  • SHA512

    8cc05677e15359ad06d609258fdb996e5e6ea8683cc49b595ac7a627265c1fa8e828cea7a97657326d8261c42a803e0d70f582387fc6579aede7f7a9b02a1e1f

  • SSDEEP

    1536:8W2zMKzBAxiURheeZzXFMShQKUwlMsWS+lskBW1SVyh+BCtQ:KMSBIiURhNzXFMeUXsWS+lskBW9b

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Disables taskbar notifications via registry modification
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 26 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
    "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
      "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
      2⤵
        PID:1792
      • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
        "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
        2⤵
          PID:112
        • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
          "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
          2⤵
            PID:792
          • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
            "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
            2⤵
              PID:1620
            • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
              "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
              2⤵
                PID:1708
              • C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe
                "C:\Users\Admin\AppData\Local\Temp\cf5120af81b5c6806445b62f3b340dbf70abb06e4b5429010e0edd9a5ea337bd.exe"
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:584
                • C:\Windows\SysWOW64\msiexec.exe
                  C:\Windows\SysWOW64\msiexec.exe
                  3⤵
                  • Modifies visiblity of hidden/system files in Explorer
                  • UAC bypass
                  • Adds policy Run key to start application
                  • Blocklisted process makes network request
                  • Drops file in Program Files directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious behavior: RenamesItself
                  • Suspicious use of AdjustPrivilegeToken
                  PID:520

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/520-65-0x0000000000000000-mapping.dmp

            • memory/520-70-0x000000007EF90000-0x000000007EF96000-memory.dmp

              Filesize

              24KB

            • memory/520-69-0x000000007EF90000-0x000000007EF96000-memory.dmp

              Filesize

              24KB

            • memory/520-68-0x0000000000EC0000-0x0000000000ED4000-memory.dmp

              Filesize

              80KB

            • memory/584-57-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/584-63-0x000000007EF90000-0x000000007EF96000-memory.dmp

              Filesize

              24KB

            • memory/584-64-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/584-59-0x000000000017FBDE-mapping.dmp

            • memory/584-67-0x000000007EF90000-0x000000007EF96000-memory.dmp

              Filesize

              24KB

            • memory/584-56-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/584-55-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB

            • memory/1888-60-0x0000000074230000-0x00000000747DB000-memory.dmp

              Filesize

              5.7MB

            • memory/1888-61-0x0000000000380000-0x0000000000383000-memory.dmp

              Filesize

              12KB

            • memory/1888-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

              Filesize

              8KB