Analysis

  • max time kernel
    151s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 12:51

General

  • Target

    755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe

  • Size

    256KB

  • MD5

    bddc29c99880f0ffd86d2f81638481cd

  • SHA1

    9ea33af7a5f6a9a49c4478789df5e6df90d9b2f1

  • SHA256

    755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e

  • SHA512

    9bd2e38c2c2221bf8557920a26121a4bf84e08e63498c89f3921b182c1bfc9666613d0d41ad98b72c8b993a91767387474717b8d84f72dac6cef2ca4cc17f43b

  • SSDEEP

    6144:mfaI3NYI996MCsMFKiMjgEyfwIJRbu43jfjfdzeuUh0p43ePuM:mfaI9YQ93CZFKjjg8yk43jfjfvIM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe
          "C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe
            "C:\Users\Admin\AppData\Local\Temp\755884529419b7baf08a4d0f370712805ea23420f4df852c57d625c15b2a9b9e.exe"
            3⤵
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe
              "C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe
                "C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:984
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc6c43aaa.bat"
              4⤵
              • Deletes itself
              PID:652
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1184
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:992
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:976
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1752

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\tmpc6c43aaa.bat

                Filesize

                307B

                MD5

                dfd76ee500143a34379ec835777f02c6

                SHA1

                e755ee78a6113076ff36b55ad2428a1a692e16d7

                SHA256

                46e3d5594e3db6460f60c3eb8e2290a138da98bc9bad582c33bc6ad6d8543d16

                SHA512

                b59290f5c47de10333a4f6fd9e40f47db68f793cfbdb745722f1fbd8c1cef20f31066a031b64f6177f41ca20aafb79b5abaee4c4a818bed4d3b6bb9d4d095de0

              • C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe

                Filesize

                256KB

                MD5

                f097b2045ba3b8fb2a928d2e33b1126e

                SHA1

                dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca

                SHA256

                7b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3

                SHA512

                bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962

              • C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe

                Filesize

                256KB

                MD5

                f097b2045ba3b8fb2a928d2e33b1126e

                SHA1

                dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca

                SHA256

                7b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3

                SHA512

                bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962

              • C:\Users\Admin\AppData\Roaming\Miafy\ucucb.exe

                Filesize

                256KB

                MD5

                f097b2045ba3b8fb2a928d2e33b1126e

                SHA1

                dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca

                SHA256

                7b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3

                SHA512

                bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962

              • \Users\Admin\AppData\Roaming\Miafy\ucucb.exe

                Filesize

                256KB

                MD5

                f097b2045ba3b8fb2a928d2e33b1126e

                SHA1

                dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca

                SHA256

                7b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3

                SHA512

                bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962

              • \Users\Admin\AppData\Roaming\Miafy\ucucb.exe

                Filesize

                256KB

                MD5

                f097b2045ba3b8fb2a928d2e33b1126e

                SHA1

                dd937fc009a99f059d5ff3ef6dab6e718dd8e7ca

                SHA256

                7b8cc3c8830d287b2899128b061420b8569c68bc4dd9386c9855cdda0481f9a3

                SHA512

                bb7942a8e7dccae775cbacdb4831ca9f5aa36f77fc8020a9aec93887ee0f466d2df9c4b1595565172869395eed1aa3d2090390af2fd93c9580fd13dbe9423962

              • memory/652-114-0x00000000000F0000-0x0000000000117000-memory.dmp

                Filesize

                156KB

              • memory/652-106-0x0000000000000000-mapping.dmp

              • memory/652-112-0x00000000000F0000-0x0000000000117000-memory.dmp

                Filesize

                156KB

              • memory/652-113-0x00000000000F0000-0x0000000000117000-memory.dmp

                Filesize

                156KB

              • memory/652-111-0x00000000000F0000-0x0000000000117000-memory.dmp

                Filesize

                156KB

              • memory/976-124-0x00000000025F0000-0x0000000002617000-memory.dmp

                Filesize

                156KB

              • memory/976-125-0x00000000025F0000-0x0000000002617000-memory.dmp

                Filesize

                156KB

              • memory/976-126-0x00000000025F0000-0x0000000002617000-memory.dmp

                Filesize

                156KB

              • memory/976-127-0x00000000025F0000-0x0000000002617000-memory.dmp

                Filesize

                156KB

              • memory/984-75-0x000000000041D470-mapping.dmp

              • memory/984-104-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/984-128-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/992-121-0x0000000000210000-0x0000000000237000-memory.dmp

                Filesize

                156KB

              • memory/992-120-0x0000000000210000-0x0000000000237000-memory.dmp

                Filesize

                156KB

              • memory/992-119-0x0000000000210000-0x0000000000237000-memory.dmp

                Filesize

                156KB

              • memory/992-118-0x0000000000210000-0x0000000000237000-memory.dmp

                Filesize

                156KB

              • memory/1064-107-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/1064-105-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1064-62-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/1064-63-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/1064-57-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB

              • memory/1064-58-0x000000000041D470-mapping.dmp

              • memory/1064-60-0x0000000076701000-0x0000000076703000-memory.dmp

                Filesize

                8KB

              • memory/1064-100-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1064-103-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1064-102-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1064-101-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1064-108-0x0000000000430000-0x0000000000457000-memory.dmp

                Filesize

                156KB

              • memory/1120-83-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                Filesize

                156KB

              • memory/1120-80-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                Filesize

                156KB

              • memory/1120-85-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                Filesize

                156KB

              • memory/1120-84-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                Filesize

                156KB

              • memory/1120-82-0x0000000001C80000-0x0000000001CA7000-memory.dmp

                Filesize

                156KB

              • memory/1184-91-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1184-89-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1184-88-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1184-90-0x0000000001CB0000-0x0000000001CD7000-memory.dmp

                Filesize

                156KB

              • memory/1192-61-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB

              • memory/1192-56-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB

              • memory/1248-97-0x0000000002580000-0x00000000025A7000-memory.dmp

                Filesize

                156KB

              • memory/1248-96-0x0000000002580000-0x00000000025A7000-memory.dmp

                Filesize

                156KB

              • memory/1248-95-0x0000000002580000-0x00000000025A7000-memory.dmp

                Filesize

                156KB

              • memory/1248-94-0x0000000002580000-0x00000000025A7000-memory.dmp

                Filesize

                156KB

              • memory/1680-66-0x0000000000000000-mapping.dmp

              • memory/1680-71-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB

              • memory/1680-78-0x0000000000400000-0x0000000000444000-memory.dmp

                Filesize

                272KB

              • memory/1752-131-0x0000000001D80000-0x0000000001DA7000-memory.dmp

                Filesize

                156KB

              • memory/1752-132-0x0000000001D80000-0x0000000001DA7000-memory.dmp

                Filesize

                156KB

              • memory/1752-134-0x0000000001D80000-0x0000000001DA7000-memory.dmp

                Filesize

                156KB

              • memory/1752-133-0x0000000001D80000-0x0000000001DA7000-memory.dmp

                Filesize

                156KB