Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 05:31

General

  • Target

    rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe

  • Size

    171KB

  • MD5

    a804f34778af2e79285fc1322f1b412e

  • SHA1

    072450802be854e19fdf8e84b153e64acf37e61d

  • SHA256

    787a3ec22002c515ea6093e691c4578d3872cd0e24db671122d65b19e491036b

  • SHA512

    306748ac10dcc89af61d4b52f753ba44f4741a2b7b597de8bbce867cd1055640288b8e9f7cd77ebbb2f80c3bacdf3b01097c7eeb95f19285dc807e5fbc46aa9e

  • SSDEEP

    3072:igpd+HKWTnOwsDBY4XAHNycjNtTUhx0faUU8EoyDElkCd:igpMHKWTDun+DU6rqYlv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1320
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe
        "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe
          "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_3280000236_telekom_de_002839300002_11_0000352899_000005.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1620
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS6374~1.BAT"
            4⤵
            • Deletes itself
            PID:1528
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1240
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "104023927136570299919172501061910430442-1381025287-1952036318-18197740251938545325"
        1⤵
          PID:1376

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms6374069.bat

          Filesize

          201B

          MD5

          291fe7b0640bd8d8e88061c573eb59b6

          SHA1

          7c90b39691619025f5b39d4f95360b3274997a09

          SHA256

          09e825373c935227158bd9007e8526f8229c8d623178d862c6718dbf3600601d

          SHA512

          db7820a88f4745ed327cecfe19e3b9759ece10c67428f6ac01196df1ea1b8bfbab1f6188fe1586e0ebd9ab20a046bf68cb04d85cf16d72e084bc3ea112b64885

        • memory/1240-97-0x0000000001BD0000-0x0000000001BE7000-memory.dmp

          Filesize

          92KB

        • memory/1240-89-0x0000000037550000-0x0000000037560000-memory.dmp

          Filesize

          64KB

        • memory/1320-96-0x0000000000130000-0x0000000000147000-memory.dmp

          Filesize

          92KB

        • memory/1320-88-0x0000000037550000-0x0000000037560000-memory.dmp

          Filesize

          64KB

        • memory/1356-73-0x00000000025A0000-0x00000000025B7000-memory.dmp

          Filesize

          92KB

        • memory/1356-95-0x00000000025A0000-0x00000000025B7000-memory.dmp

          Filesize

          92KB

        • memory/1356-75-0x0000000037550000-0x0000000037560000-memory.dmp

          Filesize

          64KB

        • memory/1376-91-0x0000000037550000-0x0000000037560000-memory.dmp

          Filesize

          64KB

        • memory/1376-94-0x0000000000050000-0x0000000000067000-memory.dmp

          Filesize

          92KB

        • memory/1376-93-0x0000000001A50000-0x0000000001A67000-memory.dmp

          Filesize

          92KB

        • memory/1376-90-0x0000000037550000-0x0000000037560000-memory.dmp

          Filesize

          64KB

        • memory/1528-72-0x0000000000000000-mapping.dmp

        • memory/1612-70-0x0000000000230000-0x000000000023E000-memory.dmp

          Filesize

          56KB

        • memory/1612-54-0x0000000076681000-0x0000000076683000-memory.dmp

          Filesize

          8KB

        • memory/1620-80-0x0000000000260000-0x0000000000274000-memory.dmp

          Filesize

          80KB

        • memory/1620-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-64-0x00000000004010C0-mapping.dmp

        • memory/1620-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-71-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-66-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1620-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB