Analysis

  • max time kernel
    154s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 17:57

General

  • Target

    e216ac06d0fde7a4e4c8b57641d9d6f2929039537e3b53745a776354f598fad1.exe

  • Size

    534KB

  • MD5

    6b97b75dd6eb688db2934f2250ecc9f8

  • SHA1

    49fc3a3e3164f8bae7eae1069b11fb99ec74fab2

  • SHA256

    e216ac06d0fde7a4e4c8b57641d9d6f2929039537e3b53745a776354f598fad1

  • SHA512

    6c377d76fe46f67ff97ed660b3c32140ddb4501dce08ecd1f783a0905a4eec2a689df2d010d6b83e4dfb0c1de84375d65674b937c7fc0d1823cbf09352bfa75a

  • SSDEEP

    12288:1JZ7H7AQTmNBt8XlBLglAfNpQofcyw35139Gu:Vz7AQKNBtm/QoUN3A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1764
  • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
    wmiadap.exe /F /T /R
    1⤵
      PID:1672
    • C:\Windows\system32\sppsvc.exe
      C:\Windows\system32\sppsvc.exe
      1⤵
        PID:1816
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\e216ac06d0fde7a4e4c8b57641d9d6f2929039537e3b53745a776354f598fad1.exe
          "C:\Users\Admin\AppData\Local\Temp\e216ac06d0fde7a4e4c8b57641d9d6f2929039537e3b53745a776354f598fad1.exe"
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1792
      • C:\Windows\System32\spoolsv.exe
        C:\Windows\System32\spoolsv.exe
        1⤵
          PID:328

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\XormiCmogu\XormiCmogu.dat
          Filesize

          230KB

          MD5

          db5b4f5393ccac3c258ff3ef2426cf9f

          SHA1

          663850789045684209da01d5d752a0b34304e3b7

          SHA256

          05ce901af1a0ae28f0a20dda1c34c808eb7a4422fe7a9cb638cb097e7cacafaf

          SHA512

          a73c07af8a14f9be737890bed1e53a7a610726bb6636bc88f06383e84df5917a21a1238c3bc1c53e100ea3d78a7b6e8e5b77b1802319a658dcaa6ac6e6793154

        • \ProgramData\XormiCmogu\XormiCmogu.dat
          Filesize

          230KB

          MD5

          db5b4f5393ccac3c258ff3ef2426cf9f

          SHA1

          663850789045684209da01d5d752a0b34304e3b7

          SHA256

          05ce901af1a0ae28f0a20dda1c34c808eb7a4422fe7a9cb638cb097e7cacafaf

          SHA512

          a73c07af8a14f9be737890bed1e53a7a610726bb6636bc88f06383e84df5917a21a1238c3bc1c53e100ea3d78a7b6e8e5b77b1802319a658dcaa6ac6e6793154

        • memory/328-60-0x0000000001EC0000-0x0000000001F14000-memory.dmp
          Filesize

          336KB

        • memory/1236-75-0x00000000029A0000-0x00000000029F4000-memory.dmp
          Filesize

          336KB

        • memory/1236-76-0x0000000002A60000-0x0000000002ACB000-memory.dmp
          Filesize

          428KB

        • memory/1792-54-0x0000000076321000-0x0000000076323000-memory.dmp
          Filesize

          8KB

        • memory/1792-55-0x0000000000400000-0x0000000000441000-memory.dmp
          Filesize

          260KB

        • memory/1792-58-0x0000000074DB0000-0x0000000074DE3000-memory.dmp
          Filesize

          204KB

        • memory/1792-73-0x0000000000400000-0x0000000000489000-memory.dmp
          Filesize

          548KB

        • memory/1792-74-0x0000000074DB0000-0x0000000074E13000-memory.dmp
          Filesize

          396KB

        • memory/1792-77-0x0000000000400000-0x0000000000441000-memory.dmp
          Filesize

          260KB

        • memory/1792-78-0x0000000074DB0000-0x0000000074DE3000-memory.dmp
          Filesize

          204KB