Analysis

  • max time kernel
    151s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 03:49

General

  • Target

    23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e.exe

  • Size

    256KB

  • MD5

    c08a33590d9500c3919c5da2c697bd69

  • SHA1

    0498e7894859a3c8d42ceda44c93fd02241b9ec7

  • SHA256

    23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e

  • SHA512

    2d70f1e284906c67faabc2a2b27be8e8f5dba54c9cbfd0663b8f72fcbfb9a14c620c94835bb2bd3b7b6b433ecfcdfaa00235767574413fee7ae7f3cbb2230ad9

  • SSDEEP

    6144:LlZc6UTHrL0qKKOChMJZb0IcWw1upO7MpAgje:BoHrL0qKKHhAOUu

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1260
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1336
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1412
          • C:\Users\Admin\AppData\Local\Temp\23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e.exe
            "C:\Users\Admin\AppData\Local\Temp\23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:328
            • C:\Users\Admin\AppData\Local\Temp\23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e.exe
              "C:\Users\Admin\AppData\Local\Temp\23d24c1392bff2516a7dbd08cf0d2a9a13615970ce60a7b9a46568ff6600aa0e.exe"
              3⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1380
              • C:\Users\Admin\AppData\Roaming\Vova\beor.exe
                "C:\Users\Admin\AppData\Roaming\Vova\beor.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2020
                • C:\Users\Admin\AppData\Roaming\Vova\beor.exe
                  "C:\Users\Admin\AppData\Roaming\Vova\beor.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:1988
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc174faac.bat"
                4⤵
                • Deletes itself
                • Suspicious use of AdjustPrivilegeToken
                PID:1896
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-163351683621330329862053060700-1521979429-1959676713-168701753410111669381152010898"
          1⤵
            PID:1348
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:584
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1624
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:852
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1196

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmpc174faac.bat
                  Filesize

                  307B

                  MD5

                  8de08ab364763c9071cbc2dea62f1fea

                  SHA1

                  f5f8e15abb8f35ffc2d7263394a02b4453866c5f

                  SHA256

                  96b7c944f6fab5f341b0c78a20d3f3c82ef4637c7c5979865aeac5fb9c6243d8

                  SHA512

                  c495f75280e774a880b567ebedb51111463fc30dc9a5c47a60f9bb122bb13ac4f7d8ae0b177c825fafbe0d9443ec1f5363a9a956e0a5ec2fd96faba74f253bef

                • C:\Users\Admin\AppData\Roaming\Udmue\feub.ruv
                  Filesize

                  721B

                  MD5

                  1af1d1563335992b770a77eed24d2a77

                  SHA1

                  21356c279fc28608f562ccd396a376de0320a91a

                  SHA256

                  817d5250501af9fda06da4c622ef1a6daaececddf2484009e64bfbc90dcd41d1

                  SHA512

                  be0ea2f64b4c2cd25541cab5a82f26ed39a0dd8f05f9d76eba275cbce7dffdb73f6ae423d6ca240c349cf21cb1e846de754f28c301786460793d96b7141e85f2

                • C:\Users\Admin\AppData\Roaming\Udmue\feub.ruv
                  Filesize

                  721B

                  MD5

                  1af1d1563335992b770a77eed24d2a77

                  SHA1

                  21356c279fc28608f562ccd396a376de0320a91a

                  SHA256

                  817d5250501af9fda06da4c622ef1a6daaececddf2484009e64bfbc90dcd41d1

                  SHA512

                  be0ea2f64b4c2cd25541cab5a82f26ed39a0dd8f05f9d76eba275cbce7dffdb73f6ae423d6ca240c349cf21cb1e846de754f28c301786460793d96b7141e85f2

                • C:\Users\Admin\AppData\Roaming\Vova\beor.exe
                  Filesize

                  256KB

                  MD5

                  73c25c7c4604656f4db8e8b3b37ae4eb

                  SHA1

                  b1ee29e58a1dd25c548040c25055ed495c5c2188

                  SHA256

                  0a828c8dea6a772ff98b71cb3cb06ded062067fea283a57d1f3fa7f0023f4c19

                  SHA512

                  0b6f988e816de6d0abea11e32f3bf0da33b824364b5a8e83e39ae83ca61edb75004af29a5007f4307ac9d5f888eef86ec5ad8af39b1fb000a400e91cac355d29

                • C:\Users\Admin\AppData\Roaming\Vova\beor.exe
                  Filesize

                  256KB

                  MD5

                  73c25c7c4604656f4db8e8b3b37ae4eb

                  SHA1

                  b1ee29e58a1dd25c548040c25055ed495c5c2188

                  SHA256

                  0a828c8dea6a772ff98b71cb3cb06ded062067fea283a57d1f3fa7f0023f4c19

                  SHA512

                  0b6f988e816de6d0abea11e32f3bf0da33b824364b5a8e83e39ae83ca61edb75004af29a5007f4307ac9d5f888eef86ec5ad8af39b1fb000a400e91cac355d29

                • C:\Users\Admin\AppData\Roaming\Vova\beor.exe
                  Filesize

                  256KB

                  MD5

                  73c25c7c4604656f4db8e8b3b37ae4eb

                  SHA1

                  b1ee29e58a1dd25c548040c25055ed495c5c2188

                  SHA256

                  0a828c8dea6a772ff98b71cb3cb06ded062067fea283a57d1f3fa7f0023f4c19

                  SHA512

                  0b6f988e816de6d0abea11e32f3bf0da33b824364b5a8e83e39ae83ca61edb75004af29a5007f4307ac9d5f888eef86ec5ad8af39b1fb000a400e91cac355d29

                • \Users\Admin\AppData\Roaming\Vova\beor.exe
                  Filesize

                  256KB

                  MD5

                  73c25c7c4604656f4db8e8b3b37ae4eb

                  SHA1

                  b1ee29e58a1dd25c548040c25055ed495c5c2188

                  SHA256

                  0a828c8dea6a772ff98b71cb3cb06ded062067fea283a57d1f3fa7f0023f4c19

                  SHA512

                  0b6f988e816de6d0abea11e32f3bf0da33b824364b5a8e83e39ae83ca61edb75004af29a5007f4307ac9d5f888eef86ec5ad8af39b1fb000a400e91cac355d29

                • \Users\Admin\AppData\Roaming\Vova\beor.exe
                  Filesize

                  256KB

                  MD5

                  73c25c7c4604656f4db8e8b3b37ae4eb

                  SHA1

                  b1ee29e58a1dd25c548040c25055ed495c5c2188

                  SHA256

                  0a828c8dea6a772ff98b71cb3cb06ded062067fea283a57d1f3fa7f0023f4c19

                  SHA512

                  0b6f988e816de6d0abea11e32f3bf0da33b824364b5a8e83e39ae83ca61edb75004af29a5007f4307ac9d5f888eef86ec5ad8af39b1fb000a400e91cac355d29

                • memory/584-135-0x0000000003AC0000-0x0000000003AE7000-memory.dmp
                  Filesize

                  156KB

                • memory/584-127-0x00000000025C0000-0x00000000025D0000-memory.dmp
                  Filesize

                  64KB

                • memory/584-136-0x0000000003AC0000-0x0000000003AE7000-memory.dmp
                  Filesize

                  156KB

                • memory/584-137-0x0000000003AC0000-0x0000000003AE7000-memory.dmp
                  Filesize

                  156KB

                • memory/584-138-0x0000000003AC0000-0x0000000003AE7000-memory.dmp
                  Filesize

                  156KB

                • memory/584-119-0x000007FEFC291000-0x000007FEFC293000-memory.dmp
                  Filesize

                  8KB

                • memory/584-120-0x000007FEF6CB1000-0x000007FEF6CB3000-memory.dmp
                  Filesize

                  8KB

                • memory/584-121-0x00000000023D0000-0x00000000023E0000-memory.dmp
                  Filesize

                  64KB

                • memory/1260-74-0x0000000001DF0000-0x0000000001E17000-memory.dmp
                  Filesize

                  156KB

                • memory/1260-78-0x0000000001DF0000-0x0000000001E17000-memory.dmp
                  Filesize

                  156KB

                • memory/1260-79-0x0000000001DF0000-0x0000000001E17000-memory.dmp
                  Filesize

                  156KB

                • memory/1260-77-0x0000000001DF0000-0x0000000001E17000-memory.dmp
                  Filesize

                  156KB

                • memory/1260-76-0x0000000001DF0000-0x0000000001E17000-memory.dmp
                  Filesize

                  156KB

                • memory/1336-82-0x00000000019C0000-0x00000000019E7000-memory.dmp
                  Filesize

                  156KB

                • memory/1336-83-0x00000000019C0000-0x00000000019E7000-memory.dmp
                  Filesize

                  156KB

                • memory/1336-84-0x00000000019C0000-0x00000000019E7000-memory.dmp
                  Filesize

                  156KB

                • memory/1336-85-0x00000000019C0000-0x00000000019E7000-memory.dmp
                  Filesize

                  156KB

                • memory/1348-114-0x0000000001B00000-0x0000000001B27000-memory.dmp
                  Filesize

                  156KB

                • memory/1348-111-0x0000000001B00000-0x0000000001B27000-memory.dmp
                  Filesize

                  156KB

                • memory/1348-113-0x0000000001B00000-0x0000000001B27000-memory.dmp
                  Filesize

                  156KB

                • memory/1348-112-0x0000000001B00000-0x0000000001B27000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-59-0x0000000075ED1000-0x0000000075ED3000-memory.dmp
                  Filesize

                  8KB

                • memory/1380-57-0x0000000000413048-mapping.dmp
                • memory/1380-60-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-61-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-94-0x00000000024F0000-0x0000000002517000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-106-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-107-0x00000000024F0000-0x0000000002517000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-56-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-97-0x00000000024F0000-0x0000000002517000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-96-0x00000000024F0000-0x0000000002517000-memory.dmp
                  Filesize

                  156KB

                • memory/1380-95-0x00000000024F0000-0x0000000002517000-memory.dmp
                  Filesize

                  156KB

                • memory/1412-90-0x0000000002220000-0x0000000002247000-memory.dmp
                  Filesize

                  156KB

                • memory/1412-89-0x0000000002220000-0x0000000002247000-memory.dmp
                  Filesize

                  156KB

                • memory/1412-88-0x0000000002220000-0x0000000002247000-memory.dmp
                  Filesize

                  156KB

                • memory/1412-91-0x0000000002220000-0x0000000002247000-memory.dmp
                  Filesize

                  156KB

                • memory/1896-116-0x00000000001B0000-0x00000000001D7000-memory.dmp
                  Filesize

                  156KB

                • memory/1896-105-0x00000000001C2CBA-mapping.dmp
                • memory/1896-100-0x00000000001B0000-0x00000000001D7000-memory.dmp
                  Filesize

                  156KB

                • memory/1896-103-0x00000000001B0000-0x00000000001D7000-memory.dmp
                  Filesize

                  156KB

                • memory/1896-104-0x00000000001B0000-0x00000000001D7000-memory.dmp
                  Filesize

                  156KB

                • memory/1896-102-0x00000000001B0000-0x00000000001D7000-memory.dmp
                  Filesize

                  156KB

                • memory/1988-117-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/1988-70-0x0000000000413048-mapping.dmp
                • memory/1988-139-0x0000000000400000-0x0000000000427000-memory.dmp
                  Filesize

                  156KB

                • memory/2020-64-0x0000000000000000-mapping.dmp