Analysis

  • max time kernel
    242s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:24

General

  • Target

    479200748de8926490fd2e41aaa0a4b710533e8d8f205bfbba9fba6416ca7731.exe

  • Size

    7.7MB

  • MD5

    626ca3c805656cb224a8979d8f3a5759

  • SHA1

    ab79aa8261643739c6eb2810747fdf6fde5bef72

  • SHA256

    479200748de8926490fd2e41aaa0a4b710533e8d8f205bfbba9fba6416ca7731

  • SHA512

    d1e2b853d1736a8ab61ab880f78417c311ddb27a59695cbb3fc2314f46c7c51b8dbbb1b45b610f913ee9ebf292da56a54ba71471f7bade6159275a7bc423b21f

  • SSDEEP

    196608:Lvi5h13yOdMV67aojkDkxCf0LgHSKDx96bwMhphUrBrPfg4:O5j3yO/aoJFgHSKDx0bvparBjfg4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\479200748de8926490fd2e41aaa0a4b710533e8d8f205bfbba9fba6416ca7731.exe
    "C:\Users\Admin\AppData\Local\Temp\479200748de8926490fd2e41aaa0a4b710533e8d8f205bfbba9fba6416ca7731.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\DE30.tmp\DF59.tmp\DF5A.bat C:\Users\Admin\AppData\Local\Temp\479200748de8926490fd2e41aaa0a4b710533e8d8f205bfbba9fba6416ca7731.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\baprar.exe
        baprar.exe baprar.sys free.sys
        3⤵
        • Executes dropped EXE
        • Sets service image path in registry
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\free.exe
        free.exe
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:560

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\DF59.tmp\DF5A.bat
    Filesize

    67B

    MD5

    60dd9f76d5186c9529b030698147ecf4

    SHA1

    e9a7be9e9872bdea320dd108976dd33dff0686d1

    SHA256

    426fdf4e211c2a786ea51695a784babe5bcf59e5f72e796ec89b0a6c40e1ea03

    SHA512

    7fef023ab66172510c8516f7e8e24e494e17a8b973d7c8b080c2e95093452c281230e70a89876cea0d210ad1f7d0d0fbe7a84a840810509d9706cd90e2e87d5e

  • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\baprar.exe
    Filesize

    20KB

    MD5

    104d16826db9b10ed83dd119e410b9f5

    SHA1

    f8f0468abaf481ab9590e7dd65f8c2ca3baf2aea

    SHA256

    9a097103785ddea1e9db97c2ac74347997913e705b0564be870c44704c36b604

    SHA512

    995babfb10713a422ba21fb009c394eb08ec06ca4394923d3efce37b3ca6fa18ef54563a17c2a503df12fbe8332bfb4b1808ba652b0e893556a4499898faab81

  • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\free.exe
    Filesize

    5.6MB

    MD5

    093d03dba3010b8a0085e6477460f3d8

    SHA1

    bcf0aae36f38ff5bb2105ad7532c669986566a09

    SHA256

    f17d046c287609b896807b483450be5461bc03bce7a0ece44866141168fa1342

    SHA512

    b6a885d5dc34e5d59db68f6176af270aed979c379ca5c8ade0530f8eeccce5caa42f58feee4cbcacf5798938dd56bf69e4ca373c60663e305200de007111809d

  • C:\Users\Admin\AppData\Local\Temp\DE30.tmp\free.exe
    Filesize

    5.6MB

    MD5

    093d03dba3010b8a0085e6477460f3d8

    SHA1

    bcf0aae36f38ff5bb2105ad7532c669986566a09

    SHA256

    f17d046c287609b896807b483450be5461bc03bce7a0ece44866141168fa1342

    SHA512

    b6a885d5dc34e5d59db68f6176af270aed979c379ca5c8ade0530f8eeccce5caa42f58feee4cbcacf5798938dd56bf69e4ca373c60663e305200de007111809d

  • \Users\Admin\AppData\Local\Temp\DE30.tmp\baprar.exe
    Filesize

    20KB

    MD5

    104d16826db9b10ed83dd119e410b9f5

    SHA1

    f8f0468abaf481ab9590e7dd65f8c2ca3baf2aea

    SHA256

    9a097103785ddea1e9db97c2ac74347997913e705b0564be870c44704c36b604

    SHA512

    995babfb10713a422ba21fb009c394eb08ec06ca4394923d3efce37b3ca6fa18ef54563a17c2a503df12fbe8332bfb4b1808ba652b0e893556a4499898faab81

  • \Users\Admin\AppData\Local\Temp\DE30.tmp\free.exe
    Filesize

    5.6MB

    MD5

    093d03dba3010b8a0085e6477460f3d8

    SHA1

    bcf0aae36f38ff5bb2105ad7532c669986566a09

    SHA256

    f17d046c287609b896807b483450be5461bc03bce7a0ece44866141168fa1342

    SHA512

    b6a885d5dc34e5d59db68f6176af270aed979c379ca5c8ade0530f8eeccce5caa42f58feee4cbcacf5798938dd56bf69e4ca373c60663e305200de007111809d

  • memory/428-54-0x0000000074ED1000-0x0000000074ED3000-memory.dmp
    Filesize

    8KB

  • memory/560-61-0x0000000000000000-mapping.dmp
  • memory/560-65-0x000000013F150000-0x000000013FBAF000-memory.dmp
    Filesize

    10.4MB

  • memory/560-64-0x000000013F150000-0x000000013FBAF000-memory.dmp
    Filesize

    10.4MB

  • memory/560-68-0x000007FEFB691000-0x000007FEFB693000-memory.dmp
    Filesize

    8KB

  • memory/560-69-0x000000013F150000-0x000000013FBAF000-memory.dmp
    Filesize

    10.4MB

  • memory/588-58-0x0000000000000000-mapping.dmp
  • memory/1532-55-0x0000000000000000-mapping.dmp