Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
Resource
win10v2004-20220812-en
General
-
Target
rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
-
Size
176KB
-
MD5
4a1d13a05a93cfaa8dd2627c696d2f0b
-
SHA1
173c81da2aab91f225f8eb5e8fcc87119be4eff0
-
SHA256
03f825726fdf3341bcfa36fcfd6dcd08e9d7ec3df982f7af9a290aa6f3c5647c
-
SHA512
29269b35d3b041ccf08d2351e4f3fa906ed396e5a880b357398f2f72ba7a20ff870531b2d7febaa1e4173412074d6bc7bee5723ad683011ee4a247fb683e7301
-
SSDEEP
3072:q6AMa+ceqZl+r4okWL23kjsZUQoRyV01WZIrLwwWyKdMd9zfp0T0:VfzsbWa3hZUHRHwwWy8UO4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1488 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\dhohjter.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\dhohjter.exe\"" Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe Token: SeDebugPrivilege 1424 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1424 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1488 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 27 PID 1368 wrote to memory of 1488 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 27 PID 1368 wrote to memory of 1488 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 27 PID 1368 wrote to memory of 1488 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 27 PID 1368 wrote to memory of 1424 1368 rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe 15 PID 1424 wrote to memory of 1260 1424 Explorer.EXE 19 PID 1424 wrote to memory of 1396 1424 Explorer.EXE 12 PID 1424 wrote to memory of 1368 1424 Explorer.EXE 26 PID 1424 wrote to memory of 1488 1424 Explorer.EXE 27 PID 1424 wrote to memory of 1488 1424 Explorer.EXE 27 PID 1424 wrote to memory of 912 1424 Explorer.EXE 28
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1396
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS7994~1.BAT"3⤵
- Deletes itself
PID:1488
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "741007894-1584801341-292000553-1868971018-12271749447671093231687831149-1971651142"1⤵PID:912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD55de434690dbe76b3ae76740a0ed412aa
SHA144ebf53d61a23b8bc71f3c23f9bcf1303bcd24ea
SHA256f07fc06f992a7679aa3b7848f69d939732945c311f7652c2992ae307ed612f72
SHA51272323e9a3bc8962fd8eb99f8a815769d66d26615ca898bb0b14a30a85c528a84b8118e50425885a6cf035c94b5ec41d491400ac5e4b967e04b57eb37faf236eb