Analysis

  • max time kernel
    139s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 23:17

General

  • Target

    df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe

  • Size

    119KB

  • MD5

    0206d396524ffaa64103151c820ddea6

  • SHA1

    9ba5346a908713f15740370d5e82b393aad54fed

  • SHA256

    df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd

  • SHA512

    ffc2c5c0fab6ef6cb5efecf0d22831aabf9e0d86fd1b02b0451e7e5e3fde6017fd17fb0a74b42382e4d8dad8221d30e2bd7847def7a87c9db26daf1ea5beadf0

  • SSDEEP

    3072:dwrhOUULAgG01X1cRxMdiQfngFz9PRtyWXQBaNWjJA:dwrhOZo01aWfmhLX4jG

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Blocklisted process makes network request 16 IoCs
  • Disables taskbar notifications via registry modification
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 51 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe
    "C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe
      "C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe"
      2⤵
        PID:268
      • C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe
        "C:\Users\Admin\AppData\Local\Temp\df0a4e83cbab7d9056a55e8d4e3669a7f2035a0ff1b8b2720cb7840191ece5cd.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Windows\SysWOW64\msiexec.exe
          C:\Windows\SysWOW64\msiexec.exe
          3⤵
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Adds policy Run key to start application
          • Blocklisted process makes network request
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious behavior: RenamesItself
          • Suspicious use of AdjustPrivilegeToken
          PID:636
        • C:\Windows\SysWOW64\msiexec.exe
          C:\Windows\SysWOW64\msiexec.exe
          3⤵
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Adds policy Run key to start application
          • Blocklisted process makes network request
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious behavior: RenamesItself
          • Suspicious use of AdjustPrivilegeToken
          PID:1764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/320-65-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/320-64-0x000000007EF90000-0x000000007EF96000-memory.dmp

      Filesize

      24KB

    • memory/320-56-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/320-57-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/320-58-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/320-60-0x00000000002D8EFE-mapping.dmp

    • memory/636-63-0x0000000000000000-mapping.dmp

    • memory/636-69-0x0000000000B30000-0x0000000000B44000-memory.dmp

      Filesize

      80KB

    • memory/636-71-0x000000007EF90000-0x000000007EF96000-memory.dmp

      Filesize

      24KB

    • memory/1472-55-0x0000000074190000-0x000000007473B000-memory.dmp

      Filesize

      5.7MB

    • memory/1472-61-0x0000000074190000-0x000000007473B000-memory.dmp

      Filesize

      5.7MB

    • memory/1472-54-0x0000000075F21000-0x0000000075F23000-memory.dmp

      Filesize

      8KB

    • memory/1764-67-0x0000000000000000-mapping.dmp

    • memory/1764-70-0x000000007EF90000-0x000000007EF96000-memory.dmp

      Filesize

      24KB