Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 11:40

General

  • Target

    rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe

  • Size

    171KB

  • MD5

    a804f34778af2e79285fc1322f1b412e

  • SHA1

    072450802be854e19fdf8e84b153e64acf37e61d

  • SHA256

    787a3ec22002c515ea6093e691c4578d3872cd0e24db671122d65b19e491036b

  • SHA512

    306748ac10dcc89af61d4b52f753ba44f4741a2b7b597de8bbce867cd1055640288b8e9f7cd77ebbb2f80c3bacdf3b01097c7eeb95f19285dc807e5fbc46aa9e

  • SSDEEP

    3072:igpd+HKWTnOwsDBY4XAHNycjNtTUhx0faUU8EoyDElkCd:igpMHKWTDun+DU6rqYlv

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1168
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
          "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe
            "C:\Users\Admin\AppData\Local\Temp\rechnung_11_2014_vodafone_team_00200034994_00003999300067_11_0000002738.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS9068~1.BAT"
              4⤵
              • Deletes itself
              PID:1904
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "1801868424360927017136831253832718536-594329242-1865825689-542880229-1719621455"
        1⤵
          PID:1632

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms9068152.bat

          Filesize

          201B

          MD5

          56d8d1d756a52838c8c8e362aa327cb1

          SHA1

          914be71710c0f3955d04f3be74d760bd1ba9f9f5

          SHA256

          7ef50eaec707347f7bf540a24113a48e9f630912b10e76d1c18806cf39283aff

          SHA512

          c1ff62e371b18c7f56f88b81abc5207df351992162d8c27cebb4f6322108fc73ce67fd34b24d3c7f8c11104dede9490222f87a28a264008863b0430f86f76323

        • memory/856-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-74-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-64-0x00000000004010C0-mapping.dmp

        • memory/856-66-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/856-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/1108-93-0x00000000001B0000-0x00000000001C7000-memory.dmp

          Filesize

          92KB

        • memory/1108-86-0x0000000037AF0000-0x0000000037B00000-memory.dmp

          Filesize

          64KB

        • memory/1168-87-0x0000000037AF0000-0x0000000037B00000-memory.dmp

          Filesize

          64KB

        • memory/1168-95-0x0000000000120000-0x0000000000137000-memory.dmp

          Filesize

          92KB

        • memory/1192-75-0x0000000037AF0000-0x0000000037B00000-memory.dmp

          Filesize

          64KB

        • memory/1192-71-0x0000000002A20000-0x0000000002A37000-memory.dmp

          Filesize

          92KB

        • memory/1192-94-0x0000000002A20000-0x0000000002A37000-memory.dmp

          Filesize

          92KB

        • memory/1436-54-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB

        • memory/1436-90-0x0000000000230000-0x000000000023E000-memory.dmp

          Filesize

          56KB

        • memory/1632-92-0x00000000000D0000-0x00000000000E7000-memory.dmp

          Filesize

          92KB

        • memory/1632-89-0x0000000037AF0000-0x0000000037B00000-memory.dmp

          Filesize

          64KB

        • memory/1904-88-0x0000000037CA0000-0x0000000037CB0000-memory.dmp

          Filesize

          64KB

        • memory/1904-70-0x0000000000000000-mapping.dmp

        • memory/1904-91-0x0000000000170000-0x0000000000184000-memory.dmp

          Filesize

          80KB

        • memory/1904-82-0x0000000000170000-0x0000000000184000-memory.dmp

          Filesize

          80KB