Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 04:08

General

  • Target

    bestätigung_zahlungseingang_2014_11_55_02_277_001_033_927_0983900005_0000009127_01_20.exe

  • Size

    164KB

  • MD5

    cdaa35954dcd153996ce975b91fe719d

  • SHA1

    091608f039e47e20f3f275a70ea258c7c1e9d9a0

  • SHA256

    c8f5fab9ca9289342ae92ed1ef056e687f906fc40bbcfe2bee55d639157e06f4

  • SHA512

    89bab6eb07c59317f6bd06c24767d73e9919a6602571451c4e0b2b7f17c5b6a820d31544928cc8f06719bbb88117dd73f788f714d2363d2bba0c3639d781058a

  • SSDEEP

    3072:GJ/YG2oBmsmoA29aps+uqp65kpfuDrBNRUCLBEpXTfW0281UaOAfXTVRI9Jf+yY:GJ/GoMs1Ale5FBQrW028bOyXTHI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1136
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\bestätigung_zahlungseingang_2014_11_55_02_277_001_033_927_0983900005_0000009127_01_20.exe
        "C:\Users\Admin\AppData\Local\Temp\bestätigung_zahlungseingang_2014_11_55_02_277_001_033_927_0983900005_0000009127_01_20.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Users\Admin\AppData\Local\Temp\bestätigung_zahlungseingang_2014_11_55_02_277_001_033_927_0983900005_0000009127_01_20.exe
          C:\Users\Admin\AppData\Local\Temp\bestätigung_zahlungseingang_2014_11_55_02_277_001_033_927_0983900005_0000009127_01_20.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS4245~1.BAT"
            4⤵
            • Deletes itself
            PID:2040
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1236

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\ms4245398.bat

              Filesize

              201B

              MD5

              40f2f93b5fb8b5f1fd6a7bc4cbd342c8

              SHA1

              38f97d4799e05608c26b7937cb07d40a13bb045b

              SHA256

              3de2ab78bb6de5d0e12bb5f0435f9d1d37e36e7481517b5fbaa58b1b33df7f48

              SHA512

              b6db24553b367dadb6aa2b532fd042a8c7ed283c7bab6018f65aeb723efd748b4ee0e3d4d4dcd2514820cb5f5016bf5fb80e17d4aadd25ce2aa306ccf448ccb2

            • memory/1136-87-0x0000000000310000-0x0000000000327000-memory.dmp

              Filesize

              92KB

            • memory/1136-83-0x0000000037C70000-0x0000000037C80000-memory.dmp

              Filesize

              64KB

            • memory/1236-89-0x00000000002A0000-0x00000000002B7000-memory.dmp

              Filesize

              92KB

            • memory/1236-88-0x00000000002C0000-0x00000000002D7000-memory.dmp

              Filesize

              92KB

            • memory/1236-85-0x0000000037C70000-0x0000000037C80000-memory.dmp

              Filesize

              64KB

            • memory/1236-84-0x0000000037C70000-0x0000000037C80000-memory.dmp

              Filesize

              64KB

            • memory/1288-86-0x00000000022F0000-0x0000000002307000-memory.dmp

              Filesize

              92KB

            • memory/1288-76-0x0000000037C70000-0x0000000037C80000-memory.dmp

              Filesize

              64KB

            • memory/1288-72-0x00000000022F0000-0x0000000002307000-memory.dmp

              Filesize

              92KB

            • memory/1488-54-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

              Filesize

              8KB

            • memory/1488-65-0x0000000000290000-0x0000000000294000-memory.dmp

              Filesize

              16KB

            • memory/1744-62-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-74-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-67-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-63-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-60-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-58-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-56-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB

            • memory/1744-55-0x0000000000400000-0x0000000000412000-memory.dmp

              Filesize

              72KB