Analysis

  • max time kernel
    107s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 23:12

General

  • Target

    ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe

  • Size

    3.3MB

  • MD5

    912c57bbd7cf80a43c01cb79107f4c4c

  • SHA1

    53f9c116cdbb73deadc13f73ed0cdda0022ee3e8

  • SHA256

    ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c

  • SHA512

    c7257ede8d748859b4d2ceed6da86de9089291a15648505dca6fe53c1afc368fd50820ab4402613edd3306c8d9cdfa3fcdead9bae22dd5c26d392295df100c2e

  • SSDEEP

    49152:r41MW0CcP/6n0qHxnbM9B97O1N5Fm8JrdEZjmA5YT8dgXIEk2Guq21vwFaZEGbI:r41fv49D7y8kdkjmAi8dgYEk3K1b

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies data under HKEY_USERS 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe
    "C:\Users\Admin\AppData\Local\Temp\ed36a89d437ab16e830750e56cf1202f9fe124246474dc7407c34e1e0a370d9c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv -install
      2⤵
      • Loads dropped DLL
      PID:4400
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\SystemPromote\SystemPromote.dll",serv
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:4336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\SystemPromote\SystemPromote.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • C:\Program Files (x86)\SystemPromote\SystemPromote.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • C:\Program Files (x86)\SystemPromote\SystemPromote.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • C:\Program Files (x86)\SystemPromote\SystemPromote.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • C:\Users\Admin\AppData\Local\Temp\tf3ab64f18.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • \??\c:\Program Files (x86)\SystemPromote\SystemPromote.dll

    Filesize

    1.8MB

    MD5

    ec9d64a2afe4f415bdb9d001e636cfba

    SHA1

    3e82a6ca858ec8d538865ccc7381df735274b257

    SHA256

    941c6cf07304b84a142ab50ff3be4e93b8a5cea84fd0e78d5a48b06af1d36543

    SHA512

    ae6db277cb9b588c36ffce9c6d85009e6e584949f1d81edb172c7051065c14b768f21a0eb01ca3118ae6003bdf23a7576737d680f8c599d436f6b7021308687e

  • memory/1400-132-0x000000007EE10000-0x000000007F106000-memory.dmp

    Filesize

    3.0MB

  • memory/1400-138-0x000000007E960000-0x000000007ECB8000-memory.dmp

    Filesize

    3.3MB

  • memory/4336-153-0x000000007FA20000-0x000000007FD78000-memory.dmp

    Filesize

    3.3MB

  • memory/4400-146-0x000000007F770000-0x000000007FAC8000-memory.dmp

    Filesize

    3.3MB