Analysis

  • max time kernel
    177s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 01:54

General

  • Target

    4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe

  • Size

    483KB

  • MD5

    7bfa60f204b5c4cc84468af9ec76f9f6

  • SHA1

    5c4f0ebbf0f43f09d46f9cf8c2513e211dd479bb

  • SHA256

    4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55

  • SHA512

    eaeaef1b42bae521a497d228290b7f164a71feac51f5aca7632d00b71678b400c9c840c57e9449a70c9127cd7ed57d9fb545c4424ff2eca14d2624df7560d710

  • SSDEEP

    6144:TqNPTKSVqaGoZidNUvnovyda0crb2x7Qr+P7XQL/vjr9NF5+PLEtN9D4Zyo9KRP/:QidKQKdLcrbWa+P7AfrezGfN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3412
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:4804
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3776
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3488
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3336
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:3240
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                1⤵
                  PID:404
                • C:\Windows\Explorer.EXE
                  C:\Windows\Explorer.EXE
                  1⤵
                    PID:2552
                    • C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe
                      "C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe"
                      2⤵
                      • Suspicious use of SetThreadContext
                      • Modifies system certificate store
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:836
                      • C:\Windows\SysWOW64\CMD.exe
                        "CMD"
                        3⤵
                          PID:3400
                        • C:\Windows\SysWOW64\CMD.exe
                          "CMD"
                          3⤵
                            PID:2908
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
                            3⤵
                              PID:4800
                            • C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe
                              "C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe"
                              3⤵
                                PID:396
                              • C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe
                                "C:\Users\Admin\AppData\Local\Temp\4acb778f061b772d8b52634e8225be410788160f156ff6503e6548c37896bb55.exe"
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4404
                                • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                  "C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:1188
                                  • C:\Windows\SysWOW64\CMD.exe
                                    "CMD"
                                    5⤵
                                      PID:3608
                                    • C:\Windows\SysWOW64\CMD.exe
                                      "CMD"
                                      5⤵
                                        PID:800
                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
                                        5⤵
                                          PID:4820
                                        • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                          "C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:3032
                                        • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                          "C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of WriteProcessMemory
                                          PID:5072
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp97dabf7c.bat"
                                        4⤵
                                          PID:4472
                                  • C:\Windows\system32\taskhostw.exe
                                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                    1⤵
                                      PID:2912
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                      1⤵
                                        PID:2760
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        1⤵
                                          PID:2632
                                        • C:\Windows\System32\RuntimeBroker.exe
                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                          1⤵
                                            PID:4884
                                          • C:\Windows\system32\backgroundTaskHost.exe
                                            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                            1⤵
                                              PID:5088
                                            • C:\Windows\System32\Conhost.exe
                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              1⤵
                                                PID:3424
                                              • C:\Windows\system32\BackgroundTransferHost.exe
                                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                1⤵
                                                  PID:1468

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F356F4D07FE8C483E769E4586569404
                                                  Filesize

                                                  112KB

                                                  MD5

                                                  771eb0a15d95c59d4a1d9b96beb93036

                                                  SHA1

                                                  d6b4d56aabed4387031a0e201835ce90da95dd8d

                                                  SHA256

                                                  4ca40d5fbe9ee2d96dd73ee01ac8b76a8e3a763991202c9ed57e038140178a27

                                                  SHA512

                                                  85a65237cbfc61e51e6d79efe67b1ebfa9d4b366ba3068a2ae2ba01cd038a8b6819e929fbbb1bc17e4b675553263fd2d59a2655a675e4983a54be94a1509dc4e

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B6E683A7A45CC59BF035C9BA8C7AB9D
                                                  Filesize

                                                  494B

                                                  MD5

                                                  caf54a2f30f0d6581529aba69802a558

                                                  SHA1

                                                  861841c29f52d06dbed0b3d98882d17de2ebe5e5

                                                  SHA256

                                                  2f83623a8d36a5142131a2d4c9475446090afc3c8b90e30fb0494d5f2c3bb3cc

                                                  SHA512

                                                  d9f2f157d9a1d18eff1cae612904f22486655364e81d97ee3dd414101b9e1472cf2d2ad95ed630512ede1acc78964305c7edba038eb092383b7d6810b720fae2

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F356F4D07FE8C483E769E4586569404
                                                  Filesize

                                                  248B

                                                  MD5

                                                  2644c7583c95201e19323ebdae5d37e0

                                                  SHA1

                                                  f475e33d7b880ee6820d379147e6ce97472a79a3

                                                  SHA256

                                                  ac7b2d2b70e01b8fd67ee96aa25423266167bc7cec66e13cbd00c0610baa6ce4

                                                  SHA512

                                                  3f5ce7458cc0886c9f30354d84422501d58127f6cebfa1598322e28f431fc8aae4939858b1dcf8947eb8696474faf440480a1f9e5034a098da23c29297417e00

                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B6E683A7A45CC59BF035C9BA8C7AB9D
                                                  Filesize

                                                  250B

                                                  MD5

                                                  d92510bc809271356825889808d5b6fc

                                                  SHA1

                                                  672df369be60929ddebcd5a3b196fef5a2abb946

                                                  SHA256

                                                  b16fe0ebd68b2f588a6cdeaf9f6a79a3182b4618b4095dcf5fc02e50d3eeea34

                                                  SHA512

                                                  c03e47fbb989ea636c100b332b7a39874f4cf5227663942d9a916075af10dc74d0f9a9845e508dd208c18222be83a5f4ab45a8e010037426d25ef9abaa69f97e

                                                • C:\Users\Admin\AppData\Local\Temp\tmp97dabf7c.bat
                                                  Filesize

                                                  307B

                                                  MD5

                                                  c2cff563cb06cf7a017417b7b7c3eea5

                                                  SHA1

                                                  1ac756f2b22e9441980f6123ad82a2d4d67f657b

                                                  SHA256

                                                  94fb62a7ed7c898465dfe01708ab84e4a464d19320a093e51e85220784a077d0

                                                  SHA512

                                                  2ca44646fbd0d9ee3c040c50b5135ff1d049fd0f0cdb0816205c805cc862588731f700182e47ed78adcb3a686f5c7f542fcca39f2ad3087ee51e7eda3487a8fb

                                                • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                                  Filesize

                                                  483KB

                                                  MD5

                                                  241139952667a1bfd15cb70ce8a458cf

                                                  SHA1

                                                  fe27f2cde91e31bfee06a2211677a4a8c0af51eb

                                                  SHA256

                                                  366bcad7f97104cd09ae9402bd3a0ac313affd1e212b2dd1848d0bff3101e74b

                                                  SHA512

                                                  fb3d7fb3bd8c5fe78181f4e16dae36415b3e09615ed2369e0a7f7926c76bbecc6c13f63a6ab65155624573a16fb7f5e10aa4e1f9b935e46cf50fa91c4ec8cd44

                                                • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                                  Filesize

                                                  483KB

                                                  MD5

                                                  241139952667a1bfd15cb70ce8a458cf

                                                  SHA1

                                                  fe27f2cde91e31bfee06a2211677a4a8c0af51eb

                                                  SHA256

                                                  366bcad7f97104cd09ae9402bd3a0ac313affd1e212b2dd1848d0bff3101e74b

                                                  SHA512

                                                  fb3d7fb3bd8c5fe78181f4e16dae36415b3e09615ed2369e0a7f7926c76bbecc6c13f63a6ab65155624573a16fb7f5e10aa4e1f9b935e46cf50fa91c4ec8cd44

                                                • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                                  Filesize

                                                  483KB

                                                  MD5

                                                  241139952667a1bfd15cb70ce8a458cf

                                                  SHA1

                                                  fe27f2cde91e31bfee06a2211677a4a8c0af51eb

                                                  SHA256

                                                  366bcad7f97104cd09ae9402bd3a0ac313affd1e212b2dd1848d0bff3101e74b

                                                  SHA512

                                                  fb3d7fb3bd8c5fe78181f4e16dae36415b3e09615ed2369e0a7f7926c76bbecc6c13f63a6ab65155624573a16fb7f5e10aa4e1f9b935e46cf50fa91c4ec8cd44

                                                • C:\Users\Admin\AppData\Roaming\Itpyo\duvii.exe
                                                  Filesize

                                                  483KB

                                                  MD5

                                                  241139952667a1bfd15cb70ce8a458cf

                                                  SHA1

                                                  fe27f2cde91e31bfee06a2211677a4a8c0af51eb

                                                  SHA256

                                                  366bcad7f97104cd09ae9402bd3a0ac313affd1e212b2dd1848d0bff3101e74b

                                                  SHA512

                                                  fb3d7fb3bd8c5fe78181f4e16dae36415b3e09615ed2369e0a7f7926c76bbecc6c13f63a6ab65155624573a16fb7f5e10aa4e1f9b935e46cf50fa91c4ec8cd44

                                                • memory/396-141-0x0000000000000000-mapping.dmp
                                                • memory/800-160-0x0000000000000000-mapping.dmp
                                                • memory/836-146-0x0000000074B10000-0x00000000750C1000-memory.dmp
                                                  Filesize

                                                  5.7MB

                                                • memory/836-132-0x0000000074B10000-0x00000000750C1000-memory.dmp
                                                  Filesize

                                                  5.7MB

                                                • memory/1188-155-0x0000000074A80000-0x0000000075031000-memory.dmp
                                                  Filesize

                                                  5.7MB

                                                • memory/1188-173-0x0000000074A80000-0x0000000075031000-memory.dmp
                                                  Filesize

                                                  5.7MB

                                                • memory/1188-161-0x0000000074A80000-0x0000000075031000-memory.dmp
                                                  Filesize

                                                  5.7MB

                                                • memory/1188-150-0x0000000000000000-mapping.dmp
                                                • memory/2908-134-0x0000000000000000-mapping.dmp
                                                • memory/3032-167-0x0000000000000000-mapping.dmp
                                                • memory/3400-133-0x0000000000000000-mapping.dmp
                                                • memory/3608-159-0x0000000000000000-mapping.dmp
                                                • memory/4404-145-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4404-149-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4404-148-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4404-142-0x0000000000000000-mapping.dmp
                                                • memory/4404-147-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4404-177-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4404-156-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4472-178-0x00000000006D0000-0x000000000070B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4472-176-0x0000000000000000-mapping.dmp
                                                • memory/4472-180-0x00000000006D0000-0x000000000070B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4800-140-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4800-135-0x0000000000000000-mapping.dmp
                                                • memory/4800-136-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4800-138-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4800-139-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4820-166-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB

                                                • memory/4820-162-0x0000000000000000-mapping.dmp
                                                • memory/5072-169-0x0000000000000000-mapping.dmp
                                                • memory/5072-175-0x0000000000400000-0x000000000043B000-memory.dmp
                                                  Filesize

                                                  236KB