Analysis
-
max time kernel
202s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:11
Static task
static1
Behavioral task
behavioral1
Sample
f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe
Resource
win10v2004-20221111-en
General
-
Target
f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe
-
Size
723KB
-
MD5
3184d45c1bb061f8c1d1aa33b1589af1
-
SHA1
e89858a93ad1e4553b9759a621d051a16385a848
-
SHA256
f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9
-
SHA512
415280e60b60f36f0c5d50d9b79e22f04bb91bfa265abea86fc73f01e5f5e4fba5a5325b401c236bcda00a6c2c4d79b85669c48659adffe757f49e67029366e8
-
SSDEEP
12288:h8INhSGjMnZdUZRAawpgBSthNw5x9uG/fMvQTQgNSQAR:OZGYZdwzcHtLwX9ugfMvQUgQb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xrmgrarilu.prepid process 1500 xrmgrarilu.pre -
Processes:
resource yara_rule behavioral1/memory/1944-54-0x0000000000A00000-0x0000000000C94000-memory.dmp upx behavioral1/memory/1944-57-0x0000000000A00000-0x0000000000C94000-memory.dmp upx behavioral1/memory/1500-66-0x00000000013A0000-0x0000000001634000-memory.dmp upx behavioral1/memory/1500-69-0x00000000013A0000-0x0000000001634000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
dllhost.exepid process 948 dllhost.exe -
Loads dropped DLL 1 IoCs
Processes:
dllhost.exepid process 948 dllhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dllhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ukuemmej = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Wwspqc\\wvkjmmej.exe" dllhost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exedllhost.exexrmgrarilu.predescription pid process target process PID 1944 wrote to memory of 948 1944 f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe dllhost.exe PID 1944 wrote to memory of 948 1944 f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe dllhost.exe PID 1944 wrote to memory of 948 1944 f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe dllhost.exe PID 1944 wrote to memory of 948 1944 f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe dllhost.exe PID 1944 wrote to memory of 948 1944 f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe dllhost.exe PID 948 wrote to memory of 1500 948 dllhost.exe xrmgrarilu.pre PID 948 wrote to memory of 1500 948 dllhost.exe xrmgrarilu.pre PID 948 wrote to memory of 1500 948 dllhost.exe xrmgrarilu.pre PID 948 wrote to memory of 1500 948 dllhost.exe xrmgrarilu.pre PID 1500 wrote to memory of 772 1500 xrmgrarilu.pre dllhost.exe PID 1500 wrote to memory of 772 1500 xrmgrarilu.pre dllhost.exe PID 1500 wrote to memory of 772 1500 xrmgrarilu.pre dllhost.exe PID 1500 wrote to memory of 772 1500 xrmgrarilu.pre dllhost.exe PID 1500 wrote to memory of 772 1500 xrmgrarilu.pre dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe"C:\Users\Admin\AppData\Local\Temp\f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\xrmgrarilu.preC:\Users\Admin\AppData\Local\Temp\xrmgrarilu.pre3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe4⤵
- Adds Run key to start application
PID:772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD53184d45c1bb061f8c1d1aa33b1589af1
SHA1e89858a93ad1e4553b9759a621d051a16385a848
SHA256f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9
SHA512415280e60b60f36f0c5d50d9b79e22f04bb91bfa265abea86fc73f01e5f5e4fba5a5325b401c236bcda00a6c2c4d79b85669c48659adffe757f49e67029366e8
-
Filesize
723KB
MD53184d45c1bb061f8c1d1aa33b1589af1
SHA1e89858a93ad1e4553b9759a621d051a16385a848
SHA256f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9
SHA512415280e60b60f36f0c5d50d9b79e22f04bb91bfa265abea86fc73f01e5f5e4fba5a5325b401c236bcda00a6c2c4d79b85669c48659adffe757f49e67029366e8
-
Filesize
723KB
MD53184d45c1bb061f8c1d1aa33b1589af1
SHA1e89858a93ad1e4553b9759a621d051a16385a848
SHA256f7454ef0023faf9ac319ef95c0dc99e84060db7bca2ec3778769d45ef8ea3ed9
SHA512415280e60b60f36f0c5d50d9b79e22f04bb91bfa265abea86fc73f01e5f5e4fba5a5325b401c236bcda00a6c2c4d79b85669c48659adffe757f49e67029366e8