Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 16:30

General

  • Target

    fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe

  • Size

    376KB

  • MD5

    344445e567c46fa7afb6a53bfb13ac3f

  • SHA1

    d610a4649d9c47fb2efe12b16158ba5262398bdd

  • SHA256

    fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642

  • SHA512

    537205e5ad00625eebad5dddeda4b2cceb228be09d6a4209e9fb5b490560ffcb86fe280235ca37653fb8df94463aad6a30b5062a3a661c9826f5c12f61a92f63

  • SSDEEP

    6144:KAwhHMZ1iPD9TRvA6HRpLCd2+CavQFX152HhPtH:K/hi1ipTu6xwpIFD2Ft

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1956
  • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
    wmiadap.exe /F /T /R
    1⤵
      PID:1668
    • C:\Windows\system32\sppsvc.exe
      C:\Windows\system32\sppsvc.exe
      1⤵
        PID:984
      • C:\Users\Admin\AppData\Local\Temp\fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe
        "C:\Users\Admin\AppData\Local\Temp\fcca408ed8d51bc5fb88906b21ec223a27ddf279d2a6f0589ac5735c0d78e642.exe"
        1⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1944
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1220
      • C:\Windows\System32\spoolsv.exe
        C:\Windows\System32\spoolsv.exe
        1⤵
          PID:1028

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\WegbaQfopi\WegbaQfopi.dat

          Filesize

          253KB

          MD5

          b4b7a9a783dbe7cc2bb0559ca9d48d58

          SHA1

          55e7adb825f6ef6c61494e19efaf9027f6f8a6cc

          SHA256

          0102c0f39d8c7843cd734cec173c36d03218f5f08d52a30635dbb2aa77674806

          SHA512

          76b0bd2217fb8207baaf752180c001a2ec2f3436c594d37a7c2e8305806168d92559bd3fe544950425d9af55786626800aecc3e154daef5c1a86f46a260bb7ba

        • \ProgramData\WegbaQfopi\WegbaQfopi.dat

          Filesize

          253KB

          MD5

          b4b7a9a783dbe7cc2bb0559ca9d48d58

          SHA1

          55e7adb825f6ef6c61494e19efaf9027f6f8a6cc

          SHA256

          0102c0f39d8c7843cd734cec173c36d03218f5f08d52a30635dbb2aa77674806

          SHA512

          76b0bd2217fb8207baaf752180c001a2ec2f3436c594d37a7c2e8305806168d92559bd3fe544950425d9af55786626800aecc3e154daef5c1a86f46a260bb7ba

        • memory/1028-61-0x0000000001CB0000-0x0000000001D04000-memory.dmp

          Filesize

          336KB

        • memory/1220-76-0x0000000002B00000-0x0000000002B6B000-memory.dmp

          Filesize

          428KB

        • memory/1220-75-0x00000000029B0000-0x0000000002A04000-memory.dmp

          Filesize

          336KB

        • memory/1944-54-0x0000000000400000-0x0000000000460000-memory.dmp

          Filesize

          384KB

        • memory/1944-55-0x00000000753C1000-0x00000000753C3000-memory.dmp

          Filesize

          8KB

        • memory/1944-56-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1944-59-0x0000000074B00000-0x0000000074B33000-memory.dmp

          Filesize

          204KB

        • memory/1944-74-0x0000000074B00000-0x0000000074B68000-memory.dmp

          Filesize

          416KB

        • memory/1944-77-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1944-78-0x0000000074B00000-0x0000000074B33000-memory.dmp

          Filesize

          204KB