Analysis

  • max time kernel
    172s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:48

General

  • Target

    241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe

  • Size

    175KB

  • MD5

    3803aef840bb584ea546434d0a111dab

  • SHA1

    f7d130982a054865b5e49e3fecf34cf171c97263

  • SHA256

    241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193

  • SHA512

    980e8950f6c028d81dd0dc37fd37a1227c9092e7efd05bac062b35fd60a745db6442e224065e0f617c2812c9c0b2a166db0018b64728648eb268ed6800dc1990

  • SSDEEP

    3072:59h2mpcq5IsxwYXhj80B1TO5L7mVoxViYz8y/5+L+wlqb3QZ97Da2DC3V7+jxQKO:J2iwxWTAL7yon/5HbMaB3VyjKK8TM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe
        "C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe
          "C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe"
          3⤵
            PID:844
          • C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe
            "C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe"
            3⤵
              PID:1228
            • C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe
              "C:\Users\Admin\AppData\Local\Temp\241c1cde2f34e1c32e2b465703aee4d2a4646df7df2c3a897dde04e869641193.exe"
              3⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe
                "C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:772
                • C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe
                  "C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1936
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6b66310b.bat"
                4⤵
                • Deletes itself
                • Suspicious use of AdjustPrivilegeToken
                PID:764
        • C:\Windows\system32\Dwm.exe
          "C:\Windows\system32\Dwm.exe"
          1⤵
            PID:1232
          • C:\Windows\system32\taskhost.exe
            "taskhost.exe"
            1⤵
              PID:1160
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "-52173057-845779721-1272490186544011411-637379126766886-698075115-885082895"
              1⤵
                PID:1104
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:636
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:520
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  1⤵
                    PID:276

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp6b66310b.bat

                    Filesize

                    307B

                    MD5

                    2715e449bd0b39a54af2f1c4f24e0f23

                    SHA1

                    e0a336e2d8fa9278f9a7282e813342a98b7798aa

                    SHA256

                    e5c4a51e7db383e3b239e7494b21d01cbe4c63c03ea124e9b78e619d7bc06688

                    SHA512

                    d16b164df367c014ecc123353e42581395fcbd6e4fcd08359b17512d44722d1aebe06bbf43c3683d30ec13e738635571a9a779ec23fc7ed93f99ab2386e1f7b1

                  • C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe

                    Filesize

                    175KB

                    MD5

                    f1aaf8754dbfc5d4fecae78804784036

                    SHA1

                    8cba07d73ddb1fc25f5c6b60dd9f4e6a17b69be4

                    SHA256

                    1e12760114b61662fcdf073bcfc44f13bf871f910b65348c3a423bbef906b2da

                    SHA512

                    5543fba34133cee1c494d0f86307597327abf071ed2ad31bcdab6fb60450445872f5cc838b670fbd2898b0059c1b876cd02c11e96424e5dbbdc58eaea94bbe5d

                  • C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe

                    Filesize

                    175KB

                    MD5

                    f1aaf8754dbfc5d4fecae78804784036

                    SHA1

                    8cba07d73ddb1fc25f5c6b60dd9f4e6a17b69be4

                    SHA256

                    1e12760114b61662fcdf073bcfc44f13bf871f910b65348c3a423bbef906b2da

                    SHA512

                    5543fba34133cee1c494d0f86307597327abf071ed2ad31bcdab6fb60450445872f5cc838b670fbd2898b0059c1b876cd02c11e96424e5dbbdc58eaea94bbe5d

                  • C:\Users\Admin\AppData\Roaming\Ahezaw\advo.exe

                    Filesize

                    175KB

                    MD5

                    f1aaf8754dbfc5d4fecae78804784036

                    SHA1

                    8cba07d73ddb1fc25f5c6b60dd9f4e6a17b69be4

                    SHA256

                    1e12760114b61662fcdf073bcfc44f13bf871f910b65348c3a423bbef906b2da

                    SHA512

                    5543fba34133cee1c494d0f86307597327abf071ed2ad31bcdab6fb60450445872f5cc838b670fbd2898b0059c1b876cd02c11e96424e5dbbdc58eaea94bbe5d

                  • C:\Users\Admin\AppData\Roaming\Efam\yfah.ypu

                    Filesize

                    398B

                    MD5

                    33e4416c557bd10136c661fb0e62b714

                    SHA1

                    66a9a7ddfb916175161aa6911f746c13828a13f3

                    SHA256

                    c2709257b7f96ac1f80e86557d124f1b19a5daf3cf068b8f112a3bcb352dce84

                    SHA512

                    2577cb56e2139fb25c125e96a54777839a2bb6e7b056a9622611d8e1aff90ba56b825d8c1a6f7f258cc2784c2a32c4c93758f51ca32ed81bc8f1427209d5d419

                  • \Users\Admin\AppData\Roaming\Ahezaw\advo.exe

                    Filesize

                    175KB

                    MD5

                    f1aaf8754dbfc5d4fecae78804784036

                    SHA1

                    8cba07d73ddb1fc25f5c6b60dd9f4e6a17b69be4

                    SHA256

                    1e12760114b61662fcdf073bcfc44f13bf871f910b65348c3a423bbef906b2da

                    SHA512

                    5543fba34133cee1c494d0f86307597327abf071ed2ad31bcdab6fb60450445872f5cc838b670fbd2898b0059c1b876cd02c11e96424e5dbbdc58eaea94bbe5d

                  • \Users\Admin\AppData\Roaming\Ahezaw\advo.exe

                    Filesize

                    175KB

                    MD5

                    f1aaf8754dbfc5d4fecae78804784036

                    SHA1

                    8cba07d73ddb1fc25f5c6b60dd9f4e6a17b69be4

                    SHA256

                    1e12760114b61662fcdf073bcfc44f13bf871f910b65348c3a423bbef906b2da

                    SHA512

                    5543fba34133cee1c494d0f86307597327abf071ed2ad31bcdab6fb60450445872f5cc838b670fbd2898b0059c1b876cd02c11e96424e5dbbdc58eaea94bbe5d

                  • memory/636-142-0x0000000002370000-0x0000000002380000-memory.dmp

                    Filesize

                    64KB

                  • memory/636-141-0x000007FEF5B41000-0x000007FEF5B43000-memory.dmp

                    Filesize

                    8KB

                  • memory/636-140-0x000007FEFB731000-0x000007FEFB733000-memory.dmp

                    Filesize

                    8KB

                  • memory/764-127-0x0000000000050000-0x0000000000077000-memory.dmp

                    Filesize

                    156KB

                  • memory/764-125-0x0000000000050000-0x0000000000077000-memory.dmp

                    Filesize

                    156KB

                  • memory/764-126-0x0000000000050000-0x0000000000077000-memory.dmp

                    Filesize

                    156KB

                  • memory/764-128-0x0000000000066A07-mapping.dmp

                  • memory/764-123-0x0000000000050000-0x0000000000077000-memory.dmp

                    Filesize

                    156KB

                  • memory/764-139-0x0000000000050000-0x0000000000077000-memory.dmp

                    Filesize

                    156KB

                  • memory/772-76-0x0000000000000000-mapping.dmp

                  • memory/772-92-0x0000000000CE5000-0x0000000000CF6000-memory.dmp

                    Filesize

                    68KB

                  • memory/772-91-0x0000000074030000-0x00000000745DB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/884-56-0x0000000001FB5000-0x0000000001FC6000-memory.dmp

                    Filesize

                    68KB

                  • memory/884-68-0x00000000740B0000-0x000000007465B000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/884-69-0x0000000001FB5000-0x0000000001FC6000-memory.dmp

                    Filesize

                    68KB

                  • memory/884-55-0x00000000740B0000-0x000000007465B000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/884-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

                    Filesize

                    8KB

                  • memory/1104-133-0x0000000000120000-0x0000000000147000-memory.dmp

                    Filesize

                    156KB

                  • memory/1104-134-0x0000000000120000-0x0000000000147000-memory.dmp

                    Filesize

                    156KB

                  • memory/1104-136-0x0000000000120000-0x0000000000147000-memory.dmp

                    Filesize

                    156KB

                  • memory/1104-135-0x0000000000120000-0x0000000000147000-memory.dmp

                    Filesize

                    156KB

                  • memory/1160-97-0x0000000001D50000-0x0000000001D77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1160-98-0x0000000001D50000-0x0000000001D77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1160-100-0x0000000001D50000-0x0000000001D77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1160-99-0x0000000001D50000-0x0000000001D77000-memory.dmp

                    Filesize

                    156KB

                  • memory/1232-104-0x0000000001D40000-0x0000000001D67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1232-106-0x0000000001D40000-0x0000000001D67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1232-105-0x0000000001D40000-0x0000000001D67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1232-103-0x0000000001D40000-0x0000000001D67000-memory.dmp

                    Filesize

                    156KB

                  • memory/1284-109-0x0000000002950000-0x0000000002977000-memory.dmp

                    Filesize

                    156KB

                  • memory/1284-110-0x0000000002950000-0x0000000002977000-memory.dmp

                    Filesize

                    156KB

                  • memory/1284-112-0x0000000002950000-0x0000000002977000-memory.dmp

                    Filesize

                    156KB

                  • memory/1284-111-0x0000000002950000-0x0000000002977000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-74-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-57-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-61-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-120-0x0000000000340000-0x0000000000372000-memory.dmp

                    Filesize

                    200KB

                  • memory/1512-118-0x0000000000340000-0x0000000000367000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-116-0x0000000000340000-0x0000000000367000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-60-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-115-0x0000000000340000-0x0000000000367000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-73-0x000000000040B000-0x000000000040D000-memory.dmp

                    Filesize

                    8KB

                  • memory/1512-130-0x0000000000340000-0x0000000000367000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-129-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-72-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-71-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-70-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-67-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-64-0x0000000000416D95-mapping.dmp

                  • memory/1512-117-0x0000000000340000-0x0000000000367000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-63-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1512-58-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1936-88-0x0000000000416D95-mapping.dmp

                  • memory/1936-160-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB

                  • memory/1936-119-0x0000000000400000-0x0000000000427000-memory.dmp

                    Filesize

                    156KB