Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 04:06

General

  • Target

    74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57.exe

  • Size

    144KB

  • MD5

    738dd7cf1133cc2813a10813859e6e61

  • SHA1

    dcfca6a60b767a64058e3d653a43789c1461e997

  • SHA256

    74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57

  • SHA512

    64edf119f1ee78f63deb5b41fe978cf57a05e09ce9f9597c12e29d21e718bdd8bdc717d5049c38cdb607e4d9db33a69df4c0f2aa06c3839043685d1be7b71389

  • SSDEEP

    3072:UD6NN25bPpA3chmH/qB8WJwy/mMeUbusnZCwzPAzswF1De7iyc:JfMTpR4/JWJJ/K3sn4Q4BaOv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1152
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1232
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Users\Admin\AppData\Local\Temp\74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57.exe
          "C:\Users\Admin\AppData\Local\Temp\74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Users\Admin\AppData\Local\Temp\74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57.exe
            C:\Users\Admin\AppData\Local\Temp\74e86d70cb60b9ca846a892d99570500ddf7f5d376f70cd0c3346edd29680d57.exe
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1768
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS9068~1.BAT"
              4⤵
              • Deletes itself
              PID:552
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "-335167255-1342402528-1868656947-2094999680-4050514531668939691024914154953546764"
        1⤵
          PID:1536

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms9068152.bat

          Filesize

          201B

          MD5

          e6e57a84638d0be6d1b6f9ecfe277594

          SHA1

          f4b8959c262fceac6f870fe3de477270b5b0f691

          SHA256

          8a5e1332bf2d148db9be0646c7dd12b788d954d98de4e5f7c1ffe34e50f108c8

          SHA512

          5c9ef93a418cd35ba24113262df5dc5222974cb3bd275eee7eae2b32124fd56bac8b80a934665912c5178a1a24b941f383c5f053ba95ea5f5d4dd717a8d5915d

        • memory/552-86-0x0000000000130000-0x0000000000144000-memory.dmp

          Filesize

          80KB

        • memory/552-82-0x0000000000130000-0x0000000000144000-memory.dmp

          Filesize

          80KB

        • memory/552-71-0x0000000000000000-mapping.dmp

        • memory/1152-81-0x0000000036F00000-0x0000000036F10000-memory.dmp

          Filesize

          64KB

        • memory/1152-89-0x0000000001C20000-0x0000000001C37000-memory.dmp

          Filesize

          92KB

        • memory/1232-91-0x0000000001AD0000-0x0000000001AE7000-memory.dmp

          Filesize

          92KB

        • memory/1232-88-0x0000000036F00000-0x0000000036F10000-memory.dmp

          Filesize

          64KB

        • memory/1288-90-0x00000000029B0000-0x00000000029C7000-memory.dmp

          Filesize

          92KB

        • memory/1288-72-0x00000000029B0000-0x00000000029C7000-memory.dmp

          Filesize

          92KB

        • memory/1288-76-0x0000000036F00000-0x0000000036F10000-memory.dmp

          Filesize

          64KB

        • memory/1288-92-0x00000000029B0000-0x00000000029C7000-memory.dmp

          Filesize

          92KB

        • memory/1340-65-0x0000000000370000-0x0000000000374000-memory.dmp

          Filesize

          16KB

        • memory/1340-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

          Filesize

          8KB

        • memory/1536-87-0x00000000001E0000-0x00000000001F7000-memory.dmp

          Filesize

          92KB

        • memory/1768-64-0x00000000004010C0-mapping.dmp

        • memory/1768-74-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-67-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1768-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB