Analysis

  • max time kernel
    152s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 08:45

General

  • Target

    fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe

  • Size

    339KB

  • MD5

    a3fa59b62f4b44f00d90cd9920f662b3

  • SHA1

    a127a90e504de3297f77daac402ececeeda725d7

  • SHA256

    fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544

  • SHA512

    cdc7b77a96bd7139b27b357b795960f61ea6c8ea3aa299bf75579071a320f006dc423d036c179452b218674b0760c921722e003850f3e1b5113f1a9ae3e9d7df

  • SSDEEP

    6144:2KsYUzjJfYb+3jXutNt0GlXv4DZDGY0P6G:FsYYjJgb+3qrWuXADZDn0z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2340
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2368
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2464
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:2456
            • C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe
              "C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1044
              • C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe
                "C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe"
                3⤵
                  PID:3900
                • C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe
                  "C:\Users\Admin\AppData\Local\Temp\fb286c8c0c1bbf7c89be27016a7fce614515fa47e1e5219618b15ead6d0cf544.exe"
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:8
                  • C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe
                    "C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1264
                    • C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe
                      "C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe"
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:4116
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CIC7B75.bat"
                    4⤵
                      PID:4796
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        5⤵
                          PID:4724
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:2736
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3260
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3368
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3432
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3520
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:4612
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:3708

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Persistence

                              Registry Run Keys / Startup Folder

                              1
                              T1060

                              Defense Evasion

                              Modify Registry

                              1
                              T1112

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\CIC7B75.bat
                                Filesize

                                284B

                                MD5

                                97bab7668fa4926c5121b09211290c29

                                SHA1

                                85c1e3ac6853592d65e6608f944bf7571c26f5f3

                                SHA256

                                8e7160e49b46ee3b0cec12aa9aee2a8457b5bc1cfbb01091e2dbd8538354ee22

                                SHA512

                                edb2bd09c9030c5766485b21eded0e59d5b356673cf2678f716ce36b41e6e0fea7f37a063ac5d707370bd68f3c10aaa520756fd4d2363efaf0dd903e21ecab50

                              • C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe
                                Filesize

                                339KB

                                MD5

                                a7d3d5fd6c987fc515a536282b3f153d

                                SHA1

                                fcf935d49c6bd6e93f0040e094f8e4282dd19f1c

                                SHA256

                                dd4afdae38a8b2536cdbe0b2d5584a7921e6a166a4dd616f8ede750dac1f4fa2

                                SHA512

                                e4342941bf43e9178ee4185a1a569a6b778cbe7cae962222535063eb1777d4ff53e96f21015e2168330903ff2e624a87520265754449f7eddb85dfe83e2cb2b3

                              • C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe
                                Filesize

                                339KB

                                MD5

                                a7d3d5fd6c987fc515a536282b3f153d

                                SHA1

                                fcf935d49c6bd6e93f0040e094f8e4282dd19f1c

                                SHA256

                                dd4afdae38a8b2536cdbe0b2d5584a7921e6a166a4dd616f8ede750dac1f4fa2

                                SHA512

                                e4342941bf43e9178ee4185a1a569a6b778cbe7cae962222535063eb1777d4ff53e96f21015e2168330903ff2e624a87520265754449f7eddb85dfe83e2cb2b3

                              • C:\Users\Admin\AppData\Local\Temp\Dyovcy\iwyhgi.exe
                                Filesize

                                339KB

                                MD5

                                a7d3d5fd6c987fc515a536282b3f153d

                                SHA1

                                fcf935d49c6bd6e93f0040e094f8e4282dd19f1c

                                SHA256

                                dd4afdae38a8b2536cdbe0b2d5584a7921e6a166a4dd616f8ede750dac1f4fa2

                                SHA512

                                e4342941bf43e9178ee4185a1a569a6b778cbe7cae962222535063eb1777d4ff53e96f21015e2168330903ff2e624a87520265754449f7eddb85dfe83e2cb2b3

                              • memory/8-133-0x0000000000000000-mapping.dmp
                              • memory/8-134-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/8-137-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/8-139-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/8-138-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/8-151-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/1044-132-0x00000000007D3000-0x00000000007D6000-memory.dmp
                                Filesize

                                12KB

                              • memory/1044-136-0x00000000745F0000-0x0000000074BA1000-memory.dmp
                                Filesize

                                5.7MB

                              • memory/1044-155-0x00000000745F0000-0x0000000074BA1000-memory.dmp
                                Filesize

                                5.7MB

                              • memory/1044-135-0x00000000007D3000-0x00000000007D6000-memory.dmp
                                Filesize

                                12KB

                              • memory/1264-143-0x00000000007AB000-0x00000000007AE000-memory.dmp
                                Filesize

                                12KB

                              • memory/1264-140-0x0000000000000000-mapping.dmp
                              • memory/1264-148-0x0000000073EB0000-0x0000000074461000-memory.dmp
                                Filesize

                                5.7MB

                              • memory/1264-149-0x00000000007AB000-0x00000000007AE000-memory.dmp
                                Filesize

                                12KB

                              • memory/4116-144-0x0000000000000000-mapping.dmp
                              • memory/4116-152-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/4116-147-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/4116-146-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/4116-156-0x0000000000400000-0x0000000000442000-memory.dmp
                                Filesize

                                264KB

                              • memory/4796-150-0x0000000000000000-mapping.dmp
                              • memory/4796-154-0x00000000007D0000-0x0000000000812000-memory.dmp
                                Filesize

                                264KB