Analysis

  • max time kernel
    150s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 10:13

General

  • Target

    rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe

  • Size

    171KB

  • MD5

    a804f34778af2e79285fc1322f1b412e

  • SHA1

    072450802be854e19fdf8e84b153e64acf37e61d

  • SHA256

    787a3ec22002c515ea6093e691c4578d3872cd0e24db671122d65b19e491036b

  • SHA512

    306748ac10dcc89af61d4b52f753ba44f4741a2b7b597de8bbce867cd1055640288b8e9f7cd77ebbb2f80c3bacdf3b01097c7eeb95f19285dc807e5fbc46aa9e

  • SSDEEP

    3072:igpd+HKWTnOwsDBY4XAHNycjNtTUhx0faUU8EoyDElkCd:igpMHKWTDun+DU6rqYlv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
      "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
        "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS4245~1.BAT"
          4⤵
          • Deletes itself
          PID:656
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1228
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1140
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "-936531326-874120146161069743512629567094898541471139688569128100114871578837"
        1⤵
          PID:572

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms4245398.bat

          Filesize

          201B

          MD5

          df010799653393925cc6b0f0a747af37

          SHA1

          244b56d631e46b125457cd1c52fe43544b40a6ab

          SHA256

          0916ed0a5cde64646fdb4df4f0c8b537715e0635239508bd22c1949bc89ad663

          SHA512

          507ac61ed03b008c3314203c52cb6c4fc218a7f82ef09568d2ac3635060b5fc58e09640ca98b6a74ce59962cf1844cae0a04d31c9cd53a3039c4605b2d9760b3

        • memory/572-103-0x0000000000060000-0x0000000000077000-memory.dmp

          Filesize

          92KB

        • memory/572-102-0x0000000000100000-0x0000000000117000-memory.dmp

          Filesize

          92KB

        • memory/572-99-0x0000000036D90000-0x0000000036DA0000-memory.dmp

          Filesize

          64KB

        • memory/572-98-0x0000000036D90000-0x0000000036DA0000-memory.dmp

          Filesize

          64KB

        • memory/656-73-0x0000000000000000-mapping.dmp

        • memory/656-101-0x00000000001C0000-0x00000000001D4000-memory.dmp

          Filesize

          80KB

        • memory/656-100-0x00000000001E0000-0x00000000001F4000-memory.dmp

          Filesize

          80KB

        • memory/656-97-0x0000000036F40000-0x0000000036F50000-memory.dmp

          Filesize

          64KB

        • memory/656-96-0x0000000036F40000-0x0000000036F50000-memory.dmp

          Filesize

          64KB

        • memory/656-84-0x00000000001C0000-0x00000000001D4000-memory.dmp

          Filesize

          80KB

        • memory/936-66-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-72-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-69-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/936-64-0x00000000004010C0-mapping.dmp

        • memory/1140-83-0x0000000036D90000-0x0000000036DA0000-memory.dmp

          Filesize

          64KB

        • memory/1140-89-0x0000000001D30000-0x0000000001D47000-memory.dmp

          Filesize

          92KB

        • memory/1228-88-0x0000000036D90000-0x0000000036DA0000-memory.dmp

          Filesize

          64KB

        • memory/1228-104-0x0000000001BB0000-0x0000000001BC7000-memory.dmp

          Filesize

          92KB

        • memory/1284-82-0x0000000002A60000-0x0000000002A77000-memory.dmp

          Filesize

          92KB

        • memory/1284-86-0x000007FF5EC60000-0x000007FF5EC6A000-memory.dmp

          Filesize

          40KB

        • memory/1284-85-0x000007FEF5CB0000-0x000007FEF5DF3000-memory.dmp

          Filesize

          1.3MB

        • memory/1284-76-0x0000000036D90000-0x0000000036DA0000-memory.dmp

          Filesize

          64KB

        • memory/1284-74-0x0000000002A60000-0x0000000002A77000-memory.dmp

          Filesize

          92KB

        • memory/1284-105-0x000007FF5EC60000-0x000007FF5EC6A000-memory.dmp

          Filesize

          40KB

        • memory/1284-106-0x000007FEF5CB0000-0x000007FEF5DF3000-memory.dmp

          Filesize

          1.3MB

        • memory/1776-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

          Filesize

          8KB

        • memory/1776-68-0x0000000000230000-0x000000000023E000-memory.dmp

          Filesize

          56KB