Analysis

  • max time kernel
    179s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 23:25

General

  • Target

    c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe

  • Size

    212KB

  • MD5

    4e19fda8d79313ec8698f7313222aa44

  • SHA1

    a1fe7ca6e944beb31d2907e782bc5972a7e2ff3a

  • SHA256

    c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d

  • SHA512

    c42bf1ea7dd29d8c49fb5dbc15fa2f7999c23afaa82d578bee27429daf4595e3462a32489f68a0c5254bad5c87f50695deee2655933aec6a5f1684acea5386a1

  • SSDEEP

    3072:YhQTUwEYksBFJdIdNg0qHaBheXkbxWPobjHCADDv0dqv8AmA2xCkXK:YPwlJdIETdXkbcPujiev2PS

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1140
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1228
        • C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe
          "C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe
            "C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"
            3⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe
              "C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1160
              • C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe
                "C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:580
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp63e703c8.bat"
              4⤵
              • Deletes itself
              • Suspicious use of AdjustPrivilegeToken
              PID:280
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1184
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-1578033532-1130273514-292879391-658370679498381316-1957784603-14538513251802986260"
          1⤵
            PID:1624
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1984
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1524
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:588
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1548
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:304
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1744

                    Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\tmp63e703c8.bat

                            Filesize

                            307B

                            MD5

                            46f2394ac67b276f4acd811d686bdfe4

                            SHA1

                            49e083d69074141bffec57b364dc4766d8c9ef62

                            SHA256

                            fb126abdec984b06a963ce01adecb02eece999d3d83e1febd922d822335f7c30

                            SHA512

                            90ee3c7bf4268f275c55cfd5c97e31d79d0c4fd38dc48d00d623dee0c40cbaa6dda595c5ee32f94c68ebcce317a0cc45109d65ae437760041881c4771372d707

                          • C:\Users\Admin\AppData\Roaming\Akti\iwan.ihy

                            Filesize

                            4KB

                            MD5

                            998c71fb03c94c1d0222bdbe030aeca1

                            SHA1

                            5eefb2e84a358bd4c3c0cd7d1f0ad68d0a157c14

                            SHA256

                            993d925d73d2c3f0f7ee2e344f00659e49a1942f2d36d7dbf8ed12776f108643

                            SHA512

                            c5c33b37c2eecd8c1a5c525ae17f648f43ec96f0629324ed3aef5108c6cfd4de706db033ab34f761c924c096afa586a455ff40d1b08f7576e8db29c1e146ceeb

                          • C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe

                            Filesize

                            212KB

                            MD5

                            44f8096d1f44189b7187ad4228919a57

                            SHA1

                            5f49803fff88b6bee180f4aa2ba0865ec7570079

                            SHA256

                            79a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748

                            SHA512

                            5c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2

                          • C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe

                            Filesize

                            212KB

                            MD5

                            44f8096d1f44189b7187ad4228919a57

                            SHA1

                            5f49803fff88b6bee180f4aa2ba0865ec7570079

                            SHA256

                            79a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748

                            SHA512

                            5c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2

                          • C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe

                            Filesize

                            212KB

                            MD5

                            44f8096d1f44189b7187ad4228919a57

                            SHA1

                            5f49803fff88b6bee180f4aa2ba0865ec7570079

                            SHA256

                            79a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748

                            SHA512

                            5c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2

                          • \Users\Admin\AppData\Roaming\Iremor\keqii.exe

                            Filesize

                            212KB

                            MD5

                            44f8096d1f44189b7187ad4228919a57

                            SHA1

                            5f49803fff88b6bee180f4aa2ba0865ec7570079

                            SHA256

                            79a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748

                            SHA512

                            5c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2

                          • \Users\Admin\AppData\Roaming\Iremor\keqii.exe

                            Filesize

                            212KB

                            MD5

                            44f8096d1f44189b7187ad4228919a57

                            SHA1

                            5f49803fff88b6bee180f4aa2ba0865ec7570079

                            SHA256

                            79a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748

                            SHA512

                            5c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2

                          • memory/280-129-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-127-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-110-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-131-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-250-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-112-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-113-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-284-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-114-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/280-125-0x0000000000050000-0x000000000008B000-memory.dmp

                            Filesize

                            236KB

                          • memory/580-106-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/580-283-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1140-86-0x0000000001E30000-0x0000000001E6B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1140-85-0x0000000001E30000-0x0000000001E6B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1140-84-0x0000000001E30000-0x0000000001E6B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1140-83-0x0000000001E30000-0x0000000001E6B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1184-89-0x0000000001BB0000-0x0000000001BEB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1184-90-0x0000000001BB0000-0x0000000001BEB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1184-91-0x0000000001BB0000-0x0000000001BEB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1184-92-0x0000000001BB0000-0x0000000001BEB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1228-98-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1228-97-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1228-95-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1228-96-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                            Filesize

                            236KB

                          • memory/1624-120-0x0000000000020000-0x000000000005B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1624-121-0x0000000000020000-0x000000000005B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1624-123-0x0000000000020000-0x000000000005B000-memory.dmp

                            Filesize

                            236KB

                          • memory/1624-122-0x0000000000020000-0x000000000005B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-103-0x0000000000290000-0x00000000002CB000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-107-0x0000000000290000-0x00000000002C9000-memory.dmp

                            Filesize

                            228KB

                          • memory/2040-118-0x0000000000290000-0x00000000002C9000-memory.dmp

                            Filesize

                            228KB

                          • memory/2040-105-0x0000000000290000-0x00000000002CB000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-116-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-54-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-101-0x0000000000290000-0x00000000002CB000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-102-0x0000000000290000-0x00000000002CB000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-104-0x0000000000290000-0x00000000002CB000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-64-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-63-0x0000000076381000-0x0000000076383000-memory.dmp

                            Filesize

                            8KB

                          • memory/2040-60-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-57-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-58-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB

                          • memory/2040-55-0x0000000000400000-0x000000000043B000-memory.dmp

                            Filesize

                            236KB