Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 08:07

General

  • Target

    2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe

  • Size

    391KB

  • MD5

    8d075f98d22c930bd92b5d9f01899fe6

  • SHA1

    b38a61958617c13bcdca9956e05b4cf5b1ca6dc2

  • SHA256

    2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937

  • SHA512

    3a684bcbb084b3c77b934f9411ab59f4fa0000f407f2fa3b9b39cf8acdcdfe3873da7231f7ef8f50574746517e34427e756b806db24d61a1122759a274c98dc9

  • SSDEEP

    6144:XAmQQ7/pjykp5+BV8EAEKd1vgmFv6KZf7iMcQCJwvAynaN0mHU766t2EUHEm1:XZ7/RpsV8EAXIc66fa+AyI07dikC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe
        "C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe
          "C:\Users\Admin\AppData\Local\Temp\2eeeff87458a58f332b8a472432362da26c74caaa26ee18c3ed9a6fb4174b937.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1732
          • C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe
            "C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe
              "C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BUZE2F7.bat"
            4⤵
            • Deletes itself
            PID:320
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1332
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1256

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BUZE2F7.bat
          Filesize

          276B

          MD5

          7f80c67b85ead391904115ec14c450c9

          SHA1

          31dc23e6f8c9f01985b6309afd54a6deeeb11dd9

          SHA256

          84946c43e5ad67bf09cbfd2c07755fcb70b42b6a06a8ffe3eb0a30659ffb8f0f

          SHA512

          f5ad12397d4937c1482d70f7a29b9c8d3bb325b5975958c87fb0ac0f14f8d9e31d42124ab1af125e8f71c8546d171b760abf0cd335bf471f1a88b8aa91627a9e

        • C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • C:\Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • \Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • \Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • \Users\Admin\AppData\Local\Temp\Urer\kyof.exe
          Filesize

          391KB

          MD5

          9a7da5fbc594e963219d2b10336a402c

          SHA1

          77abc254a12aade2f330e38c5c6a7715f5b8a1d1

          SHA256

          99291ea00e0a9fdbf746dd2f8eebeffdc05476979833d7b480562ea091d713a5

          SHA512

          c70773f38d7b1a45e5217570053513259187244b19b9a0b9ff266a3312b04884d55d19959b9f61001a3baaf8f08fc84f90243840fc7d1efb16d465298aee23d5

        • memory/320-92-0x0000000000000000-mapping.dmp
        • memory/1208-67-0x0000000074A50000-0x0000000074FFB000-memory.dmp
          Filesize

          5.7MB

        • memory/1208-54-0x0000000075D01000-0x0000000075D03000-memory.dmp
          Filesize

          8KB

        • memory/1256-99-0x0000000001BA0000-0x0000000001BE2000-memory.dmp
          Filesize

          264KB

        • memory/1256-100-0x0000000001BA0000-0x0000000001BE2000-memory.dmp
          Filesize

          264KB

        • memory/1256-98-0x0000000001BA0000-0x0000000001BE2000-memory.dmp
          Filesize

          264KB

        • memory/1256-97-0x0000000001BA0000-0x0000000001BE2000-memory.dmp
          Filesize

          264KB

        • memory/1332-106-0x0000000000230000-0x0000000000272000-memory.dmp
          Filesize

          264KB

        • memory/1332-103-0x0000000000230000-0x0000000000272000-memory.dmp
          Filesize

          264KB

        • memory/1332-104-0x0000000000230000-0x0000000000272000-memory.dmp
          Filesize

          264KB

        • memory/1332-105-0x0000000000230000-0x0000000000272000-memory.dmp
          Filesize

          264KB

        • memory/1388-109-0x0000000002A50000-0x0000000002A92000-memory.dmp
          Filesize

          264KB

        • memory/1388-110-0x0000000002A50000-0x0000000002A92000-memory.dmp
          Filesize

          264KB

        • memory/1388-111-0x0000000002A50000-0x0000000002A92000-memory.dmp
          Filesize

          264KB

        • memory/1388-112-0x0000000002A50000-0x0000000002A92000-memory.dmp
          Filesize

          264KB

        • memory/1732-66-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-56-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-89-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-55-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-93-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-58-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-69-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-68-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-64-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-63-0x000000000030E47E-mapping.dmp
        • memory/1732-61-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/1732-59-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/2000-85-0x000000000118E47E-mapping.dmp
        • memory/2000-113-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/2000-114-0x0000000000400000-0x0000000000442000-memory.dmp
          Filesize

          264KB

        • memory/2032-72-0x0000000000000000-mapping.dmp
        • memory/2032-88-0x00000000744A0000-0x0000000074A4B000-memory.dmp
          Filesize

          5.7MB