Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 05:34

General

  • Target

    ȫԶQQռʵʱ̬۹.exe

  • Size

    2.0MB

  • MD5

    ec9d5905f6e79b21467a318fed5054d9

  • SHA1

    ca987850add41791a20cd56017977679f9f30388

  • SHA256

    b712edab45d38f33067c61f3d9fd8fcaedfd8f648776f34d4f8f0cdb4d0a60fb

  • SHA512

    7a38cd6478581cb0766e2587df489aae65ddf53e2922c032cae45c75607c7ff5328f744208506b450416a57236fd65deba81df2404b493640e70a71c0f2097fa

  • SSDEEP

    49152:8p4CkAI64NlqMWWNLMLf8vfGoOVbkYLYDwYflYYJYgY4:uDkBXqMWWWAHG5aYLYDwYflYYJYgY4

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ȫԶQQռʵʱ̬۹.exe
    "C:\Users\Admin\AppData\Local\Temp\ȫԶQQռʵʱ̬۹.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\empty.exe
      C:\Windows\empty.exe 1112
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1928

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\empty.exe

          Filesize

          9KB

          MD5

          523d5c39f9d8d2375c3df68251fa2249

          SHA1

          d4ed365c44bec9246fc1a65a32a7791792647a10

          SHA256

          20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

          SHA512

          526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

        • memory/1112-79-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-55-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-57-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-59-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-61-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-63-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-65-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-67-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-69-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-71-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-73-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-81-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-56-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-77-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-75-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-83-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-85-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-87-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-89-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-91-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-95-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-97-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-93-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB

        • memory/1112-98-0x0000000001EF0000-0x0000000001F75000-memory.dmp

          Filesize

          532KB

        • memory/1112-54-0x0000000074D61000-0x0000000074D63000-memory.dmp

          Filesize

          8KB

        • memory/1112-104-0x0000000010000000-0x000000001003E000-memory.dmp

          Filesize

          248KB