Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 15:11

General

  • Target

    3ae607f66ef7b620500fe00dcce4e8aeee8314d316e99f355cb5d209aa4109ca.exe

  • Size

    538KB

  • MD5

    1dbff3a9c709bcd8e87f16d19d068534

  • SHA1

    1e21532245989e09066fe3c07914b7c2746834f7

  • SHA256

    3ae607f66ef7b620500fe00dcce4e8aeee8314d316e99f355cb5d209aa4109ca

  • SHA512

    7e3c5dde892a67277613bb76299d545bdd03828177098dacb6ebbfe74ea25815bf030d19bf56d44c17ac90b329f1c5fb767cd1810d1c033524e1de79cbc08223

  • SSDEEP

    12288:sBy4GROO333gu/u2edcjd8FP+yItrc6lq:sg4nO3ngu2lHFP+yAlq

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1372
  • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
    wmiadap.exe /F /T /R
    1⤵
      PID:1200
    • C:\Windows\system32\sppsvc.exe
      C:\Windows\system32\sppsvc.exe
      1⤵
        PID:1944
      • C:\Users\Admin\AppData\Local\Temp\3ae607f66ef7b620500fe00dcce4e8aeee8314d316e99f355cb5d209aa4109ca.exe
        "C:\Users\Admin\AppData\Local\Temp\3ae607f66ef7b620500fe00dcce4e8aeee8314d316e99f355cb5d209aa4109ca.exe"
        1⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1760
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1260
      • C:\Windows\System32\spoolsv.exe
        C:\Windows\System32\spoolsv.exe
        1⤵
          PID:360

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\QugoXrir\QugoXrir.dat
          Filesize

          264KB

          MD5

          d9a38389ef1199cf9c4029cabb078d68

          SHA1

          2dcd969a875efaa6ccb43fae478c2fdfd12f89b9

          SHA256

          f7ff7330114c516ee22e874734652f420d9dc3c33d249435052ec84b771091e6

          SHA512

          6b5715bbc8e1f8027a303c8fdc3b5c00e42f9984a6ea2ecd056bece9ac323f24de77758d14f6ced2486315c251d8414a1036a005f52d6a43ae8c3766faf6f2b2

        • \ProgramData\QugoXrir\QugoXrir.dat
          Filesize

          264KB

          MD5

          d9a38389ef1199cf9c4029cabb078d68

          SHA1

          2dcd969a875efaa6ccb43fae478c2fdfd12f89b9

          SHA256

          f7ff7330114c516ee22e874734652f420d9dc3c33d249435052ec84b771091e6

          SHA512

          6b5715bbc8e1f8027a303c8fdc3b5c00e42f9984a6ea2ecd056bece9ac323f24de77758d14f6ced2486315c251d8414a1036a005f52d6a43ae8c3766faf6f2b2

        • memory/360-61-0x0000000001CD0000-0x0000000001D24000-memory.dmp
          Filesize

          336KB

        • memory/1260-75-0x0000000002B00000-0x0000000002B54000-memory.dmp
          Filesize

          336KB

        • memory/1260-76-0x0000000002C60000-0x0000000002CCB000-memory.dmp
          Filesize

          428KB

        • memory/1760-54-0x0000000000400000-0x0000000000488000-memory.dmp
          Filesize

          544KB

        • memory/1760-55-0x0000000075C51000-0x0000000075C53000-memory.dmp
          Filesize

          8KB

        • memory/1760-56-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1760-59-0x0000000074AA0000-0x0000000074AD3000-memory.dmp
          Filesize

          204KB

        • memory/1760-74-0x0000000074AA0000-0x0000000074B0C000-memory.dmp
          Filesize

          432KB

        • memory/1760-78-0x0000000074AA0000-0x0000000074AD3000-memory.dmp
          Filesize

          204KB

        • memory/1760-77-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB