Analysis

  • max time kernel
    193s
  • max time network
    203s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 23:21

General

  • Target

    fcf941c4e5a0350210bf916fb25e29682654832911c59b7599826c714fddaaab.exe

  • Size

    194KB

  • MD5

    50011c70e1fc41269b49dd76250449d9

  • SHA1

    2a3c1b5d12b05dcf692762ae89e14944db237910

  • SHA256

    fcf941c4e5a0350210bf916fb25e29682654832911c59b7599826c714fddaaab

  • SHA512

    410c231ab156655b6f655902bc5efb313a2daa658a649a6a2d3b9b409403595d23eadb1514ffaf2b2233957a1b75d778a0cb16fef08d6ff31dd393149a86aa99

  • SSDEEP

    3072:fDLK2h+t3fucSMxfBxxAI7IZ67/X/J/U8+d9R2WH9LPRJqFx/LZBia6C:fV+tvulM7xn97/X/y8+dT2m1RJSfga

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcf941c4e5a0350210bf916fb25e29682654832911c59b7599826c714fddaaab.exe
    "C:\Users\Admin\AppData\Local\Temp\fcf941c4e5a0350210bf916fb25e29682654832911c59b7599826c714fddaaab.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\.exe
      C:\Users\Admin\AppData\Local\Temp\.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1976
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RYSICQ5USD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RYSICQ5USD.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:872
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RYSICQ5USD.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RYSICQ5USD.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:584
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1428

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

3
T1060

Defense Evasion

Modify Registry

5
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\.exe
    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • C:\Users\Admin\AppData\Local\Temp\.exe
    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • \Users\Admin\AppData\Local\Temp\.exe
    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • memory/388-73-0x0000000000000000-mapping.dmp
  • memory/584-80-0x0000000000000000-mapping.dmp
  • memory/872-76-0x0000000000000000-mapping.dmp
  • memory/1016-59-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-61-0x0000000000471130-mapping.dmp
  • memory/1016-64-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-82-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-81-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-66-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-60-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-57-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1016-56-0x0000000000400000-0x0000000000473000-memory.dmp
    Filesize

    460KB

  • memory/1044-78-0x0000000000000000-mapping.dmp
  • memory/1176-74-0x0000000000000000-mapping.dmp
  • memory/1420-67-0x00000000743D0000-0x000000007497B000-memory.dmp
    Filesize

    5.7MB

  • memory/1420-54-0x0000000075C81000-0x0000000075C83000-memory.dmp
    Filesize

    8KB

  • memory/1420-65-0x00000000743D0000-0x000000007497B000-memory.dmp
    Filesize

    5.7MB

  • memory/1428-77-0x0000000000000000-mapping.dmp
  • memory/1728-75-0x0000000000000000-mapping.dmp
  • memory/1976-79-0x0000000000000000-mapping.dmp