Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 04:02

General

  • Target

    E-Card_zu_Weichnachten_scan_foto_2834792347_12_2014_21093812_000129_001_004_002910.exe

  • Size

    156KB

  • MD5

    8e9111802bf368404c2a18222b3eb986

  • SHA1

    6a744fd5cab051d4f115a172e45d7bcb9c14c276

  • SHA256

    2c4ca41292c07252bb043dae7697a91c140ba9be82fac5cd62c9f9c802959e0d

  • SHA512

    67a24d236ccf08b55a0f83338f11022da506ae9c89920162e2e6ab7a79545839f3fe118adaf4d5602ce452f9192e81d380364519beb040767b9d11ed05322832

  • SSDEEP

    3072:N2VpC7emUS2JQM2bPcmdeXTQ+LuV0/9HQZl3a12+sq:kVpC6mUVJ3IpY9x1vh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1124
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\E-Card_zu_Weichnachten_scan_foto_2834792347_12_2014_21093812_000129_001_004_002910.exe
        "C:\Users\Admin\AppData\Local\Temp\E-Card_zu_Weichnachten_scan_foto_2834792347_12_2014_21093812_000129_001_004_002910.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Users\Admin\AppData\Local\Temp\E-Card_zu_Weichnachten_scan_foto_2834792347_12_2014_21093812_000129_001_004_002910.exe
          C:\Users\Admin\AppData\Local\Temp\E-Card_zu_Weichnachten_scan_foto_2834792347_12_2014_21093812_000129_001_004_002910.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1336
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS3962~1.BAT"
            4⤵
            • Deletes itself
            PID:848
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "603643580181230018331382670816828274531957060527897768329-1946219206-433460032"
        1⤵
          PID:520

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms3962763.bat

          Filesize

          201B

          MD5

          c4de2894b1721a2930f3be205dfce33d

          SHA1

          0ef489bb020ece0e24b4d071bf008e4f1981dde8

          SHA256

          5eaea3ebacc0f1a3416288552b1068b0582b54fb3132935c18e439daf2a4bc79

          SHA512

          c0d4387fcaa0df35d1ed3a06b8266eb5bf5231cfd6ae15ea3fdd759527c66b454b8699b389b7be7e369159e3e5510571cb1caa6e1e208574ab39e4851061425f

        • memory/520-90-0x0000000037220000-0x0000000037230000-memory.dmp

          Filesize

          64KB

        • memory/520-93-0x0000000000090000-0x00000000000A7000-memory.dmp

          Filesize

          92KB

        • memory/848-82-0x0000000000140000-0x0000000000154000-memory.dmp

          Filesize

          80KB

        • memory/848-71-0x0000000000000000-mapping.dmp

        • memory/1124-97-0x0000000001C10000-0x0000000001C27000-memory.dmp

          Filesize

          92KB

        • memory/1124-96-0x0000000001C30000-0x0000000001C47000-memory.dmp

          Filesize

          92KB

        • memory/1124-89-0x0000000037220000-0x0000000037230000-memory.dmp

          Filesize

          64KB

        • memory/1124-91-0x0000000037220000-0x0000000037230000-memory.dmp

          Filesize

          64KB

        • memory/1180-95-0x0000000000340000-0x0000000000357000-memory.dmp

          Filesize

          92KB

        • memory/1180-88-0x0000000037220000-0x0000000037230000-memory.dmp

          Filesize

          64KB

        • memory/1216-98-0x000007FEF5D90000-0x000007FEF5ED3000-memory.dmp

          Filesize

          1.3MB

        • memory/1216-72-0x0000000002200000-0x0000000002217000-memory.dmp

          Filesize

          92KB

        • memory/1216-94-0x0000000002200000-0x0000000002217000-memory.dmp

          Filesize

          92KB

        • memory/1216-75-0x0000000037220000-0x0000000037230000-memory.dmp

          Filesize

          64KB

        • memory/1216-99-0x000007FF04CE0000-0x000007FF04CEA000-memory.dmp

          Filesize

          40KB

        • memory/1336-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-74-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-67-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-64-0x00000000004010C0-mapping.dmp

        • memory/1336-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1336-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1532-65-0x00000000002D0000-0x00000000002D4000-memory.dmp

          Filesize

          16KB

        • memory/1532-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

          Filesize

          8KB