Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 21:39

General

  • Target

    39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe

  • Size

    278KB

  • MD5

    fed206ff1b750ccb5c4d096e01a9f8ed

  • SHA1

    961890630651298ec5b76ea1052e551ed9ce0ae9

  • SHA256

    39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046

  • SHA512

    b4199b485f8fe2961799f47c628f37283be965bd8de1c3b24a08e306a7d5b962c76dd6208585739ee01c8a3202621964eaeb172ee6a3f631fda85fc0c2eee17b

  • SSDEEP

    6144:BDYuTFEvolzDFAXPvlM2OzgnM+aWne3+A7ZCUYotf7:pFWvG2C2FnPUR7ZCUYM7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe
        "C:\Users\Admin\AppData\Local\Temp\39ef4c50c879505f3ee773764244c51f5a74d846275673cd7f0113b5ba24d046.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Users\Admin\AppData\Roaming\Cedia\agala.exe
          "C:\Users\Admin\AppData\Roaming\Cedia\agala.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1480
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc4151a71.bat"
          3⤵
          • Deletes itself
          PID:568
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1312
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1224

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpc4151a71.bat

          Filesize

          307B

          MD5

          a9ff33d22da20fabc14cf204ab34ab20

          SHA1

          6ba75c1209e5fea02580aea55f225e1c687b38b3

          SHA256

          3258bb42fddbc7ab3c365785345c2570239b1d736753fadf0cb70f05b563dc99

          SHA512

          20014e7c42592004f4b935bea2f8532295c3fe4e50f28a7e95f8adcf519fd28c47de4fd85ad432ecc24fecb1230b49062dbe5b1b097a8343d0bced7921f08568

        • C:\Users\Admin\AppData\Roaming\Cedia\agala.exe

          Filesize

          278KB

          MD5

          c4529ef2c0d5401d9f84b6d490a5ff28

          SHA1

          3ce2f170a822de20912510ae841ea68abdf598d6

          SHA256

          c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903

          SHA512

          587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83

        • C:\Users\Admin\AppData\Roaming\Cedia\agala.exe

          Filesize

          278KB

          MD5

          c4529ef2c0d5401d9f84b6d490a5ff28

          SHA1

          3ce2f170a822de20912510ae841ea68abdf598d6

          SHA256

          c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903

          SHA512

          587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83

        • C:\Users\Admin\AppData\Roaming\Lyusu\sega.uba

          Filesize

          398B

          MD5

          89d1a6f8a5d98a66347a18579c839115

          SHA1

          84b71bc88eb8e3cc83a070f9b3884e1cdeb96d66

          SHA256

          8d3451bd1059544cc1fd27534c7d8d80ac03a5a64235425b00df4302ce3d260c

          SHA512

          2b9237773bce027e3abbbe89244b0d302cba5032c492309d8f8897b8cc80378666822da1cbb99b8e7e80231cb7a79a8bcfe0ebf9c5be4d5c490f770bf94e5ce1

        • \Users\Admin\AppData\Roaming\Cedia\agala.exe

          Filesize

          278KB

          MD5

          c4529ef2c0d5401d9f84b6d490a5ff28

          SHA1

          3ce2f170a822de20912510ae841ea68abdf598d6

          SHA256

          c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903

          SHA512

          587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83

        • \Users\Admin\AppData\Roaming\Cedia\agala.exe

          Filesize

          278KB

          MD5

          c4529ef2c0d5401d9f84b6d490a5ff28

          SHA1

          3ce2f170a822de20912510ae841ea68abdf598d6

          SHA256

          c4f8ba34d6927f9da15f105e1036e345cb13e06a1d10cab01b79614ea8ccd903

          SHA512

          587a7f5b6741159f0758323ca5157a6615c453ce45ae9bea571ff5528c8588eb8d8e8f0eddc79b833d8f2db1bf34e8062a118db576b85b855415f032af960a83

        • memory/568-98-0x0000000000050000-0x0000000000091000-memory.dmp

          Filesize

          260KB

        • memory/568-96-0x0000000000050000-0x0000000000091000-memory.dmp

          Filesize

          260KB

        • memory/568-95-0x0000000000050000-0x0000000000091000-memory.dmp

          Filesize

          260KB

        • memory/568-90-0x0000000000050000-0x0000000000091000-memory.dmp

          Filesize

          260KB

        • memory/568-107-0x0000000000050000-0x0000000000091000-memory.dmp

          Filesize

          260KB

        • memory/968-101-0x0000000001D20000-0x0000000001D6C000-memory.dmp

          Filesize

          304KB

        • memory/968-55-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/968-94-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/968-92-0x0000000000270000-0x00000000002B1000-memory.dmp

          Filesize

          260KB

        • memory/968-93-0x0000000000310000-0x000000000035C000-memory.dmp

          Filesize

          304KB

        • memory/968-56-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/968-104-0x0000000001D20000-0x0000000001D61000-memory.dmp

          Filesize

          260KB

        • memory/968-103-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/968-54-0x0000000076831000-0x0000000076833000-memory.dmp

          Filesize

          8KB

        • memory/968-83-0x0000000001D20000-0x0000000001D61000-memory.dmp

          Filesize

          260KB

        • memory/968-84-0x0000000001D20000-0x0000000001D61000-memory.dmp

          Filesize

          260KB

        • memory/968-85-0x0000000001D20000-0x0000000001D61000-memory.dmp

          Filesize

          260KB

        • memory/968-86-0x0000000001D20000-0x0000000001D61000-memory.dmp

          Filesize

          260KB

        • memory/1224-63-0x0000000001E20000-0x0000000001E61000-memory.dmp

          Filesize

          260KB

        • memory/1224-66-0x0000000001E20000-0x0000000001E61000-memory.dmp

          Filesize

          260KB

        • memory/1224-68-0x0000000001E20000-0x0000000001E61000-memory.dmp

          Filesize

          260KB

        • memory/1224-67-0x0000000001E20000-0x0000000001E61000-memory.dmp

          Filesize

          260KB

        • memory/1224-65-0x0000000001E20000-0x0000000001E61000-memory.dmp

          Filesize

          260KB

        • memory/1312-74-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

          Filesize

          260KB

        • memory/1312-73-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

          Filesize

          260KB

        • memory/1312-72-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

          Filesize

          260KB

        • memory/1312-71-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

          Filesize

          260KB

        • memory/1380-80-0x0000000002600000-0x0000000002641000-memory.dmp

          Filesize

          260KB

        • memory/1380-79-0x0000000002600000-0x0000000002641000-memory.dmp

          Filesize

          260KB

        • memory/1380-78-0x0000000002600000-0x0000000002641000-memory.dmp

          Filesize

          260KB

        • memory/1380-77-0x0000000002600000-0x0000000002641000-memory.dmp

          Filesize

          260KB

        • memory/1480-97-0x0000000000280000-0x00000000002C1000-memory.dmp

          Filesize

          260KB

        • memory/1480-100-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1480-99-0x00000000002D0000-0x000000000031C000-memory.dmp

          Filesize

          304KB