Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 04:37

General

  • Target

    15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe

  • Size

    600KB

  • MD5

    832782e8825d602ab1f56ef028a3a09f

  • SHA1

    cdf038350ccef100415629ff7a8b17d5501c39a5

  • SHA256

    15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc

  • SHA512

    dfe2c6af9adcd4237f23ac8d9b2e9688ab49c778c5403f008ec96ad96a3db3031b869adb12897037ccf0ec2d8fe99a699efb5e5c4ef5143f083747d7d0f76a9f

  • SSDEEP

    6144:xKkuO2YCt6BXyo04xS3O4F/6xOb2FxY2Fh12RrJJUzvtuQZ7TOLWxYV/8LTLEvZz:x4l3OJxOUShezvMQZy+26GZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:4652
    • C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe
      "C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:4460
        • C:\Windows\SysWOW64\CMD.exe
          "CMD"
          2⤵
            PID:2152
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
            2⤵
              PID:1556
            • C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe
              "C:\Users\Admin\AppData\Local\Temp\15b2e980e1d6df1df0918d5c504eafd037900aab654215847735f46b5900b5dc.exe"
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1644
              • C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe
                "C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4312
                • C:\Windows\SysWOW64\CMD.exe
                  "CMD"
                  4⤵
                    PID:3144
                  • C:\Windows\SysWOW64\CMD.exe
                    "CMD"
                    4⤵
                      PID:1168
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"
                      4⤵
                        PID:5000
                      • C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe
                        "C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe"
                        4⤵
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:2868
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6249f9ac.bat"
                      3⤵
                        PID:2872
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          4⤵
                            PID:2888
                    • C:\Windows\System32\RuntimeBroker.exe
                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                      1⤵
                        PID:3688
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:3568
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          1⤵
                            PID:3416
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:3356
                            • C:\Windows\system32\DllHost.exe
                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                              1⤵
                                PID:3248
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                1⤵
                                  PID:2832
                                • C:\Windows\Explorer.EXE
                                  C:\Windows\Explorer.EXE
                                  1⤵
                                    PID:3048
                                  • C:\Windows\system32\taskhostw.exe
                                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                    1⤵
                                      PID:2436
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                      1⤵
                                        PID:2296
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        1⤵
                                          PID:2288

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
                                          Filesize

                                          5B

                                          MD5

                                          5bfa51f3a417b98e7443eca90fc94703

                                          SHA1

                                          8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                          SHA256

                                          bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                          SHA512

                                          4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F
                                          Filesize

                                          834B

                                          MD5

                                          2f9af8e0d783cfa432c7041713c8f5ee

                                          SHA1

                                          974e325ade4fd9e3f450913e8269c78d1ef4836a

                                          SHA256

                                          b4c71719b03d24adf1b8d89707cdf20e2b0be78c58686d78c340da6fd3a00eb3

                                          SHA512

                                          3ccb5b22dd0cb7e4841b4979d1c0aa6e921925cc9a187c88d67d6e2f19285ed4acc30424c7e481b61e215bdae8af9d4bdc9c17fada508ff0385cd9d456968c72

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_500F57EEC9E626F78EE636E0FA5E7AFB
                                          Filesize

                                          1KB

                                          MD5

                                          975da2aaca74674764b7ea4c9a46ee7b

                                          SHA1

                                          b0229072db3f1e15b6394ad1421e65e48a12a801

                                          SHA256

                                          b84f10911c85d2fb4ce3c9bc488d782e5f6ed970f5ac320758c6323fbfe7ae96

                                          SHA512

                                          68ef6db79116a2f4d14fc28177b5b62988ca510259995fb86cac0e82b3230949207750bf0f87cda8497783be2642521d8ebfc0c28e647cbc07d480881a219d21

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
                                          Filesize

                                          404B

                                          MD5

                                          816f597f854f823adeedb8b2ee1c92d5

                                          SHA1

                                          3bd89ec3672973207d38c201296360335b363afe

                                          SHA256

                                          39ca9461f53bbeb148f6a2e1bca47ddae8a8af0c6dfb2912a4c4cc9480deec0f

                                          SHA512

                                          28cc2281117e1393a703e2c3244a76116485bd354754fddb32c1cacff998a4a6f509999eb2adda9fe961a78f01f899867de34c35e22895add485a35ff859c17e

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F
                                          Filesize

                                          188B

                                          MD5

                                          ea38209c3a85d1f8347add64e54341bc

                                          SHA1

                                          5ecc3605db2a5c688cf08615da308db2365f3e53

                                          SHA256

                                          936fa4080c598702e61f6ae3ede5725af73158ac69d792846a73f1f3f8be0cc6

                                          SHA512

                                          399ec03ac764000f88395ab4aa7edaec9561f555e664921d25c16345f5ee21aa3fe95928c7fade38e65c6ca2aa768a5914fb968bb946ed0595dc14bf7fbd4555

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_500F57EEC9E626F78EE636E0FA5E7AFB
                                          Filesize

                                          394B

                                          MD5

                                          467a5f9dbc503428b10e827eba5b8b8c

                                          SHA1

                                          c86a28645a736c916acdbb2d6a29f60b25fa83f8

                                          SHA256

                                          4a9cb9257c0c301a283d289ccc08c46cadd388d2f12fe8f5ae7a89d0eb52d344

                                          SHA512

                                          2bb0ed39154a7b667e685fb7f14f922305ab481db9fafba18e6b6b693254634ee06d7f3dff27e830971e2eba6cd45b12c95c955a6a8e332ded0838e9db837b8e

                                        • C:\Users\Admin\AppData\Local\Temp\tmp6249f9ac.bat
                                          Filesize

                                          307B

                                          MD5

                                          3fb36a80a574432a6e47f441cc18764b

                                          SHA1

                                          cb4aa1d5bdf5016555e5368ec480c1598558cac9

                                          SHA256

                                          1d50cfd7c21ca1b612e0887e13d1420526e86efaa1b07789ec49bc70fd3e45ec

                                          SHA512

                                          078c3f2614988640b1f18c3837f9d6891e164febb5e9f477d98405a4cff2b345e20627fd664cfd6290c08bbd91543b74a910c76debc16e675ce3f16083dc64c0

                                        • C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe
                                          Filesize

                                          600KB

                                          MD5

                                          0a619d34e2fee1533228f8530e12fab8

                                          SHA1

                                          e54e7b08a7c15c85371222e3ba850dd93e23ea94

                                          SHA256

                                          5533e6c3f294f742d67f8d844f710c1bb11d301844387372b098717e4c36c27b

                                          SHA512

                                          e5ecf9c7f5224826edc681c93670b4b41590158dd1ed881cc93e74444fb282d3573b4129f1fdb9500d1d779189f42d55a208665ce5ea26bb92a182d41b49a8e9

                                        • C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe
                                          Filesize

                                          600KB

                                          MD5

                                          0a619d34e2fee1533228f8530e12fab8

                                          SHA1

                                          e54e7b08a7c15c85371222e3ba850dd93e23ea94

                                          SHA256

                                          5533e6c3f294f742d67f8d844f710c1bb11d301844387372b098717e4c36c27b

                                          SHA512

                                          e5ecf9c7f5224826edc681c93670b4b41590158dd1ed881cc93e74444fb282d3573b4129f1fdb9500d1d779189f42d55a208665ce5ea26bb92a182d41b49a8e9

                                        • C:\Users\Admin\AppData\Roaming\Byne\qouvf.exe
                                          Filesize

                                          600KB

                                          MD5

                                          0a619d34e2fee1533228f8530e12fab8

                                          SHA1

                                          e54e7b08a7c15c85371222e3ba850dd93e23ea94

                                          SHA256

                                          5533e6c3f294f742d67f8d844f710c1bb11d301844387372b098717e4c36c27b

                                          SHA512

                                          e5ecf9c7f5224826edc681c93670b4b41590158dd1ed881cc93e74444fb282d3573b4129f1fdb9500d1d779189f42d55a208665ce5ea26bb92a182d41b49a8e9

                                        • memory/1168-160-0x0000000000000000-mapping.dmp
                                        • memory/1556-139-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1556-135-0x0000000000000000-mapping.dmp
                                        • memory/1556-136-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1556-138-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-175-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-147-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-148-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-144-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-166-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-146-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/1644-141-0x0000000000000000-mapping.dmp
                                        • memory/2152-133-0x0000000000000000-mapping.dmp
                                        • memory/2868-178-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/2868-179-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/2868-168-0x0000000000000000-mapping.dmp
                                        • memory/2872-177-0x0000000001020000-0x000000000105B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/2872-174-0x0000000000000000-mapping.dmp
                                        • memory/3144-159-0x0000000000000000-mapping.dmp
                                        • memory/4312-158-0x0000000074610000-0x0000000074BC1000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/4312-149-0x0000000000000000-mapping.dmp
                                        • memory/4312-167-0x0000000074610000-0x0000000074BC1000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/4312-173-0x0000000074610000-0x0000000074BC1000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/4460-134-0x0000000000000000-mapping.dmp
                                        • memory/4848-145-0x0000000074CB0000-0x0000000075261000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/4848-132-0x0000000074CB0000-0x0000000075261000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/4848-140-0x0000000074CB0000-0x0000000075261000-memory.dmp
                                          Filesize

                                          5.7MB

                                        • memory/5000-165-0x0000000000400000-0x000000000043B000-memory.dmp
                                          Filesize

                                          236KB

                                        • memory/5000-161-0x0000000000000000-mapping.dmp