Analysis

  • max time kernel
    117s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 03:51

General

  • Target

    bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f.exe

  • Size

    743KB

  • MD5

    2b9132097f55a526eb42cbf12275266a

  • SHA1

    8df68acce2554afd511e1b57faffc06ad6131b39

  • SHA256

    bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f

  • SHA512

    af8dfc8b0c9b893fb4338f062f1d9981a9d56feb26fc5b60e0279dd7a3c382078b96f3d49c85bb04b31104b1d2d31893374153d8ad4d9c3799eca9cf505a190c

  • SSDEEP

    12288:ERyTSktU4g/n/t0EW5A0zyYvJwQ5oAlK+GE4vebIk6bQQ52LgRg08y5Hpnrzy:oStU4gf2EW5A2DJr/kS4vGIk6v3Hf

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f.exe
    "C:\Users\Admin\AppData\Local\Temp\bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      PID:684
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:760

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      743KB

      MD5

      2b9132097f55a526eb42cbf12275266a

      SHA1

      8df68acce2554afd511e1b57faffc06ad6131b39

      SHA256

      bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f

      SHA512

      af8dfc8b0c9b893fb4338f062f1d9981a9d56feb26fc5b60e0279dd7a3c382078b96f3d49c85bb04b31104b1d2d31893374153d8ad4d9c3799eca9cf505a190c

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      743KB

      MD5

      2b9132097f55a526eb42cbf12275266a

      SHA1

      8df68acce2554afd511e1b57faffc06ad6131b39

      SHA256

      bb291519d074e2836f47f3226f346867f7cc8878b92f9644eed1a573796c1a2f

      SHA512

      af8dfc8b0c9b893fb4338f062f1d9981a9d56feb26fc5b60e0279dd7a3c382078b96f3d49c85bb04b31104b1d2d31893374153d8ad4d9c3799eca9cf505a190c

    • C:\Windows\uninstal.bat

      Filesize

      254B

      MD5

      f5bb844fad4358e5978f5b9245de9fb3

      SHA1

      a98c49b6af53d95fef89f1715676e3996345ffd8

      SHA256

      2ef868d18ee4bba55263968a44954edba626b91255c0b4ce36f438f6b28d3614

      SHA512

      d1be8df2fd24c7fc87be9e06cbe2504a907499c74d0d34be30700c202a063ac9108be3da8656bc01231742e1b9a8cb1c1948d4a86dbcb7e514cdd3259d4200b8

    • memory/1772-54-0x00000000757E1000-0x00000000757E3000-memory.dmp

      Filesize

      8KB