Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 05:22

General

  • Target

    f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe

  • Size

    264KB

  • MD5

    8b58640df18e896068b2c09f45c98730

  • SHA1

    7f0fca297f251f01de2a31c130eb255c6de27ac2

  • SHA256

    f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f

  • SHA512

    ebaa937a99257c8e89440f030f91e720bb94a5541ebf520bf9b8110af8fd3b91f4fa2dcf714750550b50601086529dd8bea0530b9c807a422a8d4a48644119b2

  • SSDEEP

    6144:hbuK4LJf61g46aFPr5vAvIvP5VLObatk:havLx61g46mxLXSbatk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1424
      • C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe
        "C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe
          "C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"
          3⤵
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe
            "C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1316
            • C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe
              "C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:840
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5229f4a.bat"
            4⤵
            • Deletes itself
            PID:1564
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1396
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1260
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:1744
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:660

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmpc5229f4a.bat

              Filesize

              307B

              MD5

              2671893980026627416843f22009498b

              SHA1

              0d0f247c98fca1bb5d1152aa618edcb0e504415f

              SHA256

              9041c5efc433b2006454b1156fefb3f71311894c01cb8e14b193406247725580

              SHA512

              c719db3c8f79c2e29011b1df3b780946b201b681e25afdee908421e84c9b7648e959898dde5a5d3ac51151273ea3bac537ad2cd28461b8b8584f952e055106d7

            • C:\Users\Admin\AppData\Roaming\Daazom\bookb.agi

              Filesize

              398B

              MD5

              0de95071e5b0b924f57dfd3e96298890

              SHA1

              c5caa7a6156d0da3c6b8e395afcedfa4e226ca12

              SHA256

              2323949fd421badab8fc05a518ace12be2dded239339ed7636bf5cfaa0c7c7a2

              SHA512

              0b28a66a81912bc5b117e6c258cebb023c10582ddc1c9439785ef5c934c18754447d04afb97ed683e2ce05e69ba501e7d7e72d3331852194ce57bf23437be830

            • C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe

              Filesize

              264KB

              MD5

              192692d0801edc671e706338af74cb39

              SHA1

              e307095ff69fb7261f21837fc37a1a32ea24d301

              SHA256

              1e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace

              SHA512

              c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f

            • C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe

              Filesize

              264KB

              MD5

              192692d0801edc671e706338af74cb39

              SHA1

              e307095ff69fb7261f21837fc37a1a32ea24d301

              SHA256

              1e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace

              SHA512

              c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f

            • C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe

              Filesize

              264KB

              MD5

              192692d0801edc671e706338af74cb39

              SHA1

              e307095ff69fb7261f21837fc37a1a32ea24d301

              SHA256

              1e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace

              SHA512

              c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f

            • \Users\Admin\AppData\Roaming\Qoedax\uqas.exe

              Filesize

              264KB

              MD5

              192692d0801edc671e706338af74cb39

              SHA1

              e307095ff69fb7261f21837fc37a1a32ea24d301

              SHA256

              1e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace

              SHA512

              c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f

            • \Users\Admin\AppData\Roaming\Qoedax\uqas.exe

              Filesize

              264KB

              MD5

              192692d0801edc671e706338af74cb39

              SHA1

              e307095ff69fb7261f21837fc37a1a32ea24d301

              SHA256

              1e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace

              SHA512

              c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f

            • memory/660-123-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/660-124-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/660-122-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/660-121-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/840-125-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/840-100-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/840-72-0x0000000000413048-mapping.dmp

            • memory/940-96-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/940-62-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/940-99-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/940-98-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/940-97-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/940-58-0x0000000000413048-mapping.dmp

            • memory/940-57-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/940-106-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/940-104-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/940-61-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/940-60-0x0000000076071000-0x0000000076073000-memory.dmp

              Filesize

              8KB

            • memory/940-101-0x00000000003D0000-0x00000000003F7000-memory.dmp

              Filesize

              156KB

            • memory/1260-78-0x0000000001E40000-0x0000000001E67000-memory.dmp

              Filesize

              156KB

            • memory/1260-76-0x0000000001E40000-0x0000000001E67000-memory.dmp

              Filesize

              156KB

            • memory/1260-81-0x0000000001E40000-0x0000000001E67000-memory.dmp

              Filesize

              156KB

            • memory/1260-80-0x0000000001E40000-0x0000000001E67000-memory.dmp

              Filesize

              156KB

            • memory/1260-79-0x0000000001E40000-0x0000000001E67000-memory.dmp

              Filesize

              156KB

            • memory/1316-69-0x0000000000557000-0x0000000000559000-memory.dmp

              Filesize

              8KB

            • memory/1316-65-0x0000000000000000-mapping.dmp

            • memory/1368-56-0x00000000005E7000-0x00000000005E9000-memory.dmp

              Filesize

              8KB

            • memory/1396-87-0x0000000001B40000-0x0000000001B67000-memory.dmp

              Filesize

              156KB

            • memory/1396-86-0x0000000001B40000-0x0000000001B67000-memory.dmp

              Filesize

              156KB

            • memory/1396-85-0x0000000001B40000-0x0000000001B67000-memory.dmp

              Filesize

              156KB

            • memory/1396-84-0x0000000001B40000-0x0000000001B67000-memory.dmp

              Filesize

              156KB

            • memory/1424-91-0x0000000002210000-0x0000000002237000-memory.dmp

              Filesize

              156KB

            • memory/1424-93-0x0000000002210000-0x0000000002237000-memory.dmp

              Filesize

              156KB

            • memory/1424-92-0x0000000002210000-0x0000000002237000-memory.dmp

              Filesize

              156KB

            • memory/1424-90-0x0000000002210000-0x0000000002237000-memory.dmp

              Filesize

              156KB

            • memory/1564-110-0x00000000000C0000-0x00000000000E7000-memory.dmp

              Filesize

              156KB

            • memory/1564-109-0x00000000000C0000-0x00000000000E7000-memory.dmp

              Filesize

              156KB

            • memory/1564-108-0x00000000000C0000-0x00000000000E7000-memory.dmp

              Filesize

              156KB

            • memory/1564-107-0x00000000000C0000-0x00000000000E7000-memory.dmp

              Filesize

              156KB

            • memory/1564-102-0x0000000000000000-mapping.dmp

            • memory/1744-115-0x0000000000310000-0x0000000000337000-memory.dmp

              Filesize

              156KB

            • memory/1744-116-0x0000000000310000-0x0000000000337000-memory.dmp

              Filesize

              156KB

            • memory/1744-117-0x0000000000310000-0x0000000000337000-memory.dmp

              Filesize

              156KB

            • memory/1744-118-0x0000000000310000-0x0000000000337000-memory.dmp

              Filesize

              156KB