Analysis

  • max time kernel
    151s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 00:15

General

  • Target

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe

  • Size

    323KB

  • MD5

    df315c4f845030a9be7d1488876cc4e7

  • SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

  • SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

  • SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • SSDEEP

    3072:poFmKj6DlEELLIy6IUqMCIpOGqZPJbWTlAyiGaP7a68Z3BuzmdKfhcDSx7tXDL3g:2FIlEQInIUIJiTF/azaPniJfhcuRxw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe
    "C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:320
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /k ping 0 & del "C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe" & exit
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\SysWOW64\PING.EXE
        ping 0
        3⤵
        • Runs ping.exe
        PID:1264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    471B

    MD5

    1f5ba59fd4960f050d0f2bb6de3cd499

    SHA1

    c48fcf18fc2e8a38fd113e820dfeba82e8d5bc7b

    SHA256

    0e5bb9eb8810c42cdc6a476de15c49c99a1f70b782187fc4130c7edfa9af0df1

    SHA512

    89a9d4f044c3b3afa0e16ed00d6eeda9105100b2fe1a4a18a5bcfdd868675ffd7a64b80b73be36857620d228ad9dee38d7debda26650c87cba8edaa09fdddfcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_01D2E383AD9991E3309B7DD8FB39B00C

    Filesize

    490B

    MD5

    7332274e17cd51f5b2efccdc65c38406

    SHA1

    356f4a5d987acdb26de07b96fb7484993374d186

    SHA256

    7c1d864858239f8829bd7c5f272e6db9604f1373c1de75de4c766e6f625a5f31

    SHA512

    defbe0cac6c7ddddcc63516573bb2069621619df0d2b11e4ec5821ba0a7b6f832f4cdd0c4ac02c66304e159b26117ac6c51a350be47e14c426b5d6a2af18dcc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

    Filesize

    434B

    MD5

    8034c8f80039beb6f6247b77bebe20d3

    SHA1

    358de5a4ed28a89ed1aa676d125508274ab7eba5

    SHA256

    769d294be739f86d79351cfca5d86cea7d58b03ca3be11ecc4c1d4cc1a5bba18

    SHA512

    a4f648cb91ada6e73a3ac50f50c9a4e20bfd7208e8c9544cf0c5f0afcb2745158fd38652116e6541852498bdeba7376bf89afd33898b1af5f71f1f752068ab13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_01D2E383AD9991E3309B7DD8FB39B00C

    Filesize

    430B

    MD5

    e9476b0eae004dfbeda2ff19833cd48b

    SHA1

    501c27becd93f6eb0edf7e499e63cd4e4ba59068

    SHA256

    1e0e674ff46f98c265fd320f5870246974a1ea5267a57903920ada2e95f2938d

    SHA512

    ee3d7328daaf7cb0e140b11aba0c4a732ec17b9fbc2af9ca3beb254b9b493b4060124aacaf0bdb91e3992f424de619d28f29d35f6426b270be12a73809d8ba7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    693498e33315b4de70db4e1a44dd6bbe

    SHA1

    21a5f94cd3796547a01517da363c1dcb733855fb

    SHA256

    58ebc20cb240084ee034d729112d26b2337588d044d04f64eb339f3f753e6fe4

    SHA512

    2e0588ffe945a605b5003a91063b6881096089fa43a1ffe874ff9d527f5fd30c859164e0038850d16603769a1f619fc1d86c022a5aa11f6cccefbd600cad5204

  • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe

    Filesize

    323KB

    MD5

    df315c4f845030a9be7d1488876cc4e7

    SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

    SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

    SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe

    Filesize

    323KB

    MD5

    df315c4f845030a9be7d1488876cc4e7

    SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

    SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

    SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • \Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe

    Filesize

    323KB

    MD5

    df315c4f845030a9be7d1488876cc4e7

    SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

    SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

    SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • memory/320-57-0x0000000000000000-mapping.dmp

  • memory/320-68-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/320-72-0x00000000009F9000-0x0000000000A0A000-memory.dmp

    Filesize

    68KB

  • memory/320-73-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/320-74-0x00000000009F9000-0x0000000000A0A000-memory.dmp

    Filesize

    68KB

  • memory/1264-70-0x0000000000000000-mapping.dmp

  • memory/1528-69-0x0000000000000000-mapping.dmp

  • memory/1872-54-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1872-55-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB

  • memory/1872-67-0x0000000002109000-0x000000000211A000-memory.dmp

    Filesize

    68KB

  • memory/1872-71-0x00000000740E0000-0x000000007468B000-memory.dmp

    Filesize

    5.7MB