Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 03:51

General

  • Target

    88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196.exe

  • Size

    716KB

  • MD5

    ea9ab0d64e6648f9feee920ae60f1c0e

  • SHA1

    2af19e6bebcf278687c4f797bf0ecb9ff84ec2b4

  • SHA256

    88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196

  • SHA512

    9d0399a46df102c8cffd4c60f8a4d78dd7c86d04b454f8b921a971af3085556789592be47e2b4c25be5b5598c702e2b403778017fd8343bd7bbefab8bc9e2ac5

  • SSDEEP

    12288:jRyTSktU4g/n/t0EW5A0zyYvJwQ5oAlK+GE4vebIk6bQQ52LgRg08y5HpnK9V:dStU4gf2EW5A2DJr/kS4vGIk6v3Hg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196.exe
    "C:\Users\Admin\AppData\Local\Temp\88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      PID:1048
  • C:\Program Files (x86)\svhost.exe
    "C:\Program Files (x86)\svhost.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:952

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\svhost.exe

      Filesize

      716KB

      MD5

      ea9ab0d64e6648f9feee920ae60f1c0e

      SHA1

      2af19e6bebcf278687c4f797bf0ecb9ff84ec2b4

      SHA256

      88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196

      SHA512

      9d0399a46df102c8cffd4c60f8a4d78dd7c86d04b454f8b921a971af3085556789592be47e2b4c25be5b5598c702e2b403778017fd8343bd7bbefab8bc9e2ac5

    • C:\Program Files (x86)\svhost.exe

      Filesize

      716KB

      MD5

      ea9ab0d64e6648f9feee920ae60f1c0e

      SHA1

      2af19e6bebcf278687c4f797bf0ecb9ff84ec2b4

      SHA256

      88064f99acec119fa6bd7405c52ab427695b49a3876fee6e083a4360553d0196

      SHA512

      9d0399a46df102c8cffd4c60f8a4d78dd7c86d04b454f8b921a971af3085556789592be47e2b4c25be5b5598c702e2b403778017fd8343bd7bbefab8bc9e2ac5

    • C:\Windows\uninstal.bat

      Filesize

      254B

      MD5

      93fa426826e5ef9d8f9d8aaf8afddc42

      SHA1

      9c398a67bfa300082dc2d3a13fe25764e7f795f6

      SHA256

      313ca514754b039e45ff655624af2c960934f8fa22d0d92df400bac89d7e6405

      SHA512

      d6e448fa96d8283e80b8ba4c0aa895aef42dd504fcf92266a08f094d0785d56e7aaa9b391db143ac6fe57a464c5cbf64b1dc69ccb0a18c444ad6fd43efb247e8

    • memory/944-59-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/944-63-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/1048-61-0x0000000000000000-mapping.dmp

    • memory/1628-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

      Filesize

      8KB

    • memory/1628-55-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB

    • memory/1628-56-0x0000000000400000-0x00000000004C5000-memory.dmp

      Filesize

      788KB