Analysis

  • max time kernel
    152s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 21:05

General

  • Target

    22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe

  • Size

    206KB

  • MD5

    1382b473288ae6db380553c44e0c403a

  • SHA1

    4876112cb35302139f3ef65bd23179e7ac9d4b91

  • SHA256

    22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d

  • SHA512

    dfd756d619a93842859cd48493828d72e01f81cd4b0d4c63f3cebca5a00d9ccfad50ce6a792bb99b7e85f24cea0ab260dac503a2fe750a384076a4e8a11b4699

  • SSDEEP

    3072:ySsegykPJ9vgVrFmaf1gNXoV6eYYimYPYYufSFFxDiaolL01DQYruMwLX:WeYT6AogpoUebEPYYufyDiDLnYnw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe
        "C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1132
        • C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe
          "C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe"
          3⤵
            PID:1636
          • C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe
            "C:\Users\Admin\AppData\Local\Temp\22c085aded630bf7cc0133c1806c76fea2402b7ff1ec2370b06144f60f1f085d.exe"
            3⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1172
            • C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe
              "C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1712
              • C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe
                "C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1412
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /Java /C:\Users\Admin\AppData\Roaming\Java\Java.exe
                5⤵
                  PID:1152
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /Java /C:\Users\Admin\AppData\Roaming\Java\Java.exe
                  5⤵
                    PID:1632
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0edc2b2f.bat"
                  4⤵
                  • Deletes itself
                  PID:896
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /Java /C:\Users\Admin\AppData\Roaming\Java\Java.exe
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:696
          • C:\Windows\system32\Dwm.exe
            "C:\Windows\system32\Dwm.exe"
            1⤵
              PID:1176
            • C:\Windows\system32\taskhost.exe
              "taskhost.exe"
              1⤵
                PID:1116
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1688
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:676
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1616
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  1⤵
                    PID:920
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1824

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735

                      Filesize

                      558B

                      MD5

                      3cc0012f96f8f44164c18d7de05023d9

                      SHA1

                      c8feb560d751fe720c8bdb53f5e78aa92abb9a9e

                      SHA256

                      2654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5

                      SHA512

                      626746176663e2460b18f1eb245306107060c172c4e65ad710dd75ec0b348d8f000342c0dd2f7ea3bb2e0796f61e1ddd2cd77c312d6a177ff2e70a10b68cc6af

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      340B

                      MD5

                      61c04b8c6bd2ec33b846cf9c6f7779f3

                      SHA1

                      b66763ae30bda621afde236425f8a94c85f23705

                      SHA256

                      c699a7ed98f06d24abd00c02259f6031e39a1447181cf1141c5097b1fecc0cf6

                      SHA512

                      2f18a01ee3bfd1e03a832423d7ce576c46a99d3056ac685788f33ed8a05fe4ade96cdf645fe01d3bc3831626cf5c1c619ce85b480e08e2873241ce616be998bf

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735

                      Filesize

                      232B

                      MD5

                      70cadc8140cbd936d06bf2ac64e00634

                      SHA1

                      f6b80a0c5797989291ede2dae8c4750f56733548

                      SHA256

                      eecd80d46e791f5aa7b0f4b15fb1d44e161d49d225dcc9cb1250fe2921f61036

                      SHA512

                      de8db08a20c5279f45a42860fd30ba465d5c058ebba7dbc921e845bbfd17e5d4ce4e4b30921a6214fc1b93c768c5f5e8e1c820058c45e1fb6392a0e901e98f69

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore

                      Filesize

                      2.0MB

                      MD5

                      dd943d799a974df1d218d213416380dc

                      SHA1

                      469752277fe140d90d16a32e3df05c7aeb18d730

                      SHA256

                      a169f9bf378d4e95c22a90ef945e27592b265a5ef30dac0d6b137b8954ac4e22

                      SHA512

                      62a2f308af0c610ebc6aed91ff8c812634b5b59efb3f00d197eece91688fdb3cf07d92b8c2da821c197ca29dbfa6c8c62e4e4115b01faf2a9b2f4861a0a0c694

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.chk

                      Filesize

                      8KB

                      MD5

                      e7ff9ed588dac242f65b9cd5324d42a5

                      SHA1

                      8b26e782aeb83ccf35895a2a58f39ff05d288c2f

                      SHA256

                      096da88678048d22eadd0787711095bf3903c955d4bd4ead0a44bb8e32047d4d

                      SHA512

                      53aed69c8a79d794978b1408cd4521288b5199ac029d730ab874b450d47bc116c266456f3d5ff6e4eaf4b12a10ca73dd94f46075b4ad07f1d18bf7d9160c28a7

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                      Filesize

                      2.0MB

                      MD5

                      d812f7ad898d5ecb0483182af5011652

                      SHA1

                      1c62d2b0e5bb36dd21a363e9984a9e129f7c966b

                      SHA256

                      6aecf912b7eaa08e5e35583572ffe84ee50894b6087ab5ea93741d86a35df4a3

                      SHA512

                      afc01a8de9c244cfdc8d64c15f36d47f2f1cabee33530c055b12de1ad792008a0175184c8d19dc0a24ef1d8ed6bbe7c629f1d335ac51083d90560b2b6e92125d

                    • C:\Users\Admin\AppData\Local\Temp\tmp0edc2b2f.bat

                      Filesize

                      307B

                      MD5

                      0a632f39cc772dbbfc5113149a399eb0

                      SHA1

                      3d31dfc4ecf6821d8f73f0adf8999a27c6146bac

                      SHA256

                      238005502e63bae7835a70071fb52ce152d195538a6241b606c47fa28dd4246c

                      SHA512

                      3f2eb0cf12cddc4b8e16b95c80e2dd8ba8f7ba0acc40f0611340987603f6cbe4afb4e55616f433e29fa65706b253818001d0fe4b2ef9b3a98d295b4443ace590

                    • C:\Users\Admin\AppData\Roaming\Adxyho\xoki.upe

                      Filesize

                      398B

                      MD5

                      b0f4698bbde3355c3e90203071bb59aa

                      SHA1

                      29cabe98043fc33bcd55b1224eae0d3a98a67703

                      SHA256

                      5d112bf95a8f50dd5184c2f1ac8c2b3a85d6189432866085aeaa70738c7802c2

                      SHA512

                      4922826ce817e05884a22ebf531a23a59dae86df5bdb8cfa0926481b3893ec83d8dc10df6a882d9acd92f17e41ba020775dfababe5d9188a390818061c08893d

                    • C:\Users\Admin\AppData\Roaming\Adxyho\xoki.upe

                      Filesize

                      796B

                      MD5

                      71fb387af5e6e98cf95e268cd54dc572

                      SHA1

                      f7201c3fae8e9e9ce488db1e4119121a2ef6c029

                      SHA256

                      3348b3a48b9e872c4d7442b41abafe36ed4d075a130f3353c5f8648ed11738b5

                      SHA512

                      02f587877b77711a98ef0765f0327cc0bdd75d5c354561e709a3c897141f20704c7bf7cc4cbe87e712ac75dd86274b07ee3e610ac7a9865ea091a3eddb9cd822

                    • C:\Users\Admin\AppData\Roaming\Java\Java.xml

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • C:\Users\Admin\AppData\Roaming\Java\Java.xml

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • C:\Users\Admin\AppData\Roaming\Uwxa\mone.exe

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • \Users\Admin\AppData\Roaming\Uwxa\mone.exe

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • \Users\Admin\AppData\Roaming\Uwxa\mone.exe

                      Filesize

                      206KB

                      MD5

                      b6613d9180c875b9a14a869928ef5048

                      SHA1

                      ced6f48eb2f829ee7f4458f8bbaeb1cae81468f6

                      SHA256

                      20ca3a571510a1aeb52d4cc73929d950a60124a0b4f8d036106b6f608240575e

                      SHA512

                      1f83bf120d5ad85f021b311a6c71393728f497c7bed2e68a60d85313d0517659c888313b8ab5411c46dd286234525eb85c6f3a8793499c0516d353ed605acf6b

                    • memory/696-81-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/696-143-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/696-79-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/696-158-0x00000000003B0000-0x00000000003D7000-memory.dmp

                      Filesize

                      156KB

                    • memory/696-83-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/696-72-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/696-76-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/696-74-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/696-73-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/896-237-0x0000000000050000-0x0000000000077000-memory.dmp

                      Filesize

                      156KB

                    • memory/1116-107-0x0000000000340000-0x0000000000367000-memory.dmp

                      Filesize

                      156KB

                    • memory/1116-104-0x0000000000340000-0x0000000000367000-memory.dmp

                      Filesize

                      156KB

                    • memory/1116-105-0x0000000000340000-0x0000000000367000-memory.dmp

                      Filesize

                      156KB

                    • memory/1116-106-0x0000000000340000-0x0000000000367000-memory.dmp

                      Filesize

                      156KB

                    • memory/1132-122-0x0000000000C00000-0x0000000000C27000-memory.dmp

                      Filesize

                      156KB

                    • memory/1132-124-0x0000000000C00000-0x0000000000C27000-memory.dmp

                      Filesize

                      156KB

                    • memory/1132-54-0x0000000075931000-0x0000000075933000-memory.dmp

                      Filesize

                      8KB

                    • memory/1132-68-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1132-70-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1132-195-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1132-128-0x0000000000BF0000-0x0000000000C2C000-memory.dmp

                      Filesize

                      240KB

                    • memory/1132-123-0x0000000000C00000-0x0000000000C27000-memory.dmp

                      Filesize

                      156KB

                    • memory/1132-125-0x0000000000C00000-0x0000000000C27000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-58-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-66-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-59-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-172-0x0000000000090000-0x00000000000CC000-memory.dmp

                      Filesize

                      240KB

                    • memory/1172-233-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-65-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-61-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-56-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-67-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-71-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-150-0x0000000000090000-0x00000000000CC000-memory.dmp

                      Filesize

                      240KB

                    • memory/1172-55-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-234-0x0000000000090000-0x00000000000B7000-memory.dmp

                      Filesize

                      156KB

                    • memory/1172-69-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1176-112-0x0000000001B40000-0x0000000001B67000-memory.dmp

                      Filesize

                      156KB

                    • memory/1176-113-0x0000000001B40000-0x0000000001B67000-memory.dmp

                      Filesize

                      156KB

                    • memory/1176-111-0x0000000001B40000-0x0000000001B67000-memory.dmp

                      Filesize

                      156KB

                    • memory/1176-110-0x0000000001B40000-0x0000000001B67000-memory.dmp

                      Filesize

                      156KB

                    • memory/1216-117-0x0000000002240000-0x0000000002267000-memory.dmp

                      Filesize

                      156KB

                    • memory/1216-116-0x0000000002240000-0x0000000002267000-memory.dmp

                      Filesize

                      156KB

                    • memory/1216-118-0x0000000002240000-0x0000000002267000-memory.dmp

                      Filesize

                      156KB

                    • memory/1216-119-0x0000000002240000-0x0000000002267000-memory.dmp

                      Filesize

                      156KB

                    • memory/1412-127-0x0000000000400000-0x0000000000427000-memory.dmp

                      Filesize

                      156KB

                    • memory/1632-196-0x00000000003D0000-0x00000000003F7000-memory.dmp

                      Filesize

                      156KB

                    • memory/1632-171-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1632-238-0x00000000003D0000-0x00000000003F7000-memory.dmp

                      Filesize

                      156KB

                    • memory/1632-194-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1688-129-0x000007FEFBC41000-0x000007FEFBC43000-memory.dmp

                      Filesize

                      8KB

                    • memory/1688-131-0x00000000004A0000-0x00000000004B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1688-130-0x000007FEF6641000-0x000007FEF6643000-memory.dmp

                      Filesize

                      8KB

                    • memory/1712-126-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1712-179-0x0000000001FF0000-0x000000000202C000-memory.dmp

                      Filesize

                      240KB

                    • memory/1712-151-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1712-217-0x0000000001FF0000-0x000000000202C000-memory.dmp

                      Filesize

                      240KB

                    • memory/1712-251-0x0000000074770000-0x0000000074D1B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1712-252-0x0000000001FF0000-0x0000000002017000-memory.dmp

                      Filesize

                      156KB