Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:26

General

  • Target

    455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda.exe

  • Size

    341KB

  • MD5

    d3aed86aff91840def6af292030521db

  • SHA1

    373e2c08dd2e06549ab51ae178dddbbae3d446db

  • SHA256

    455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda

  • SHA512

    3dd541d2c2c8bae3754a360530eb1f5e25cf530199e719e045aeaa4a963b140c988b227289f25b258bae17ab05dcd09c0217cf16262c9f0937670d62e0cf8bdc

  • SSDEEP

    6144:v2AVHBPYuisP5NNYZ8Rls7QOJpdAfELzwXQTsC28PAjP+WM/H2RkI:L5vYC0zJpdCEepD+WMfsd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda.exe
        "C:\Users\Admin\AppData\Local\Temp\455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda.exe
          "C:\Users\Admin\AppData\Local\Temp\455f6e6ba667ed68d72ef3f77a09b033e1d34c1af7d16dc120d080e9c0c62eda.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe
            "C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1480
            • C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe
              "C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 116
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:708
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp667beaa6.bat"
            4⤵
              PID:888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 116
            3⤵
            • Program crash
            PID:1720
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1188
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1132
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1124
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "4080988926241801491081384451-6701979841759966134-869336091-2531670782085626532"
            1⤵
              PID:984

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp667beaa6.bat

              Filesize

              307B

              MD5

              54f46c6ce65fae97e2ea3a3d0bc4d878

              SHA1

              6db15a92ff0e4f385e1d6252fce187c73dff4498

              SHA256

              6f48abcb1f7a63a8c8fcb7f82a803d7fbaf4def4cc28fe547b843f799d7e5c62

              SHA512

              0d2d4f802d518e027deb7c43362e84532d8b4b6e39077ebd7ea92c6b37ac75a8ce1059730e17db9effe6a194c3998bb309e6f46ab00920e626895dc037185b7d

            • C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • C:\Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • \Users\Admin\AppData\Roaming\Uvowxo\ykuzti.exe

              Filesize

              341KB

              MD5

              df4f4d000fa6cedbeaa06843ba42cf4c

              SHA1

              7a9902eb7a7e0f3c0f4d133a6c4185e881f386f5

              SHA256

              462ff7946e1496e36898e4dd82cd8b25b6e115a00099656643d025849db9ca3e

              SHA512

              247c0d3769d8aff640e90d840315628c6a11caa93a261c2fe2e0e70ad7fc880879cc168c3f6d8be63ae1825305a21d6f05c5ae91e2dcde2ddd2bc7d3e5028158

            • memory/516-131-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/516-189-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/516-82-0x000000000041758F-mapping.dmp

            • memory/708-182-0x0000000000800000-0x0000000000844000-memory.dmp

              Filesize

              272KB

            • memory/708-84-0x0000000000000000-mapping.dmp

            • memory/888-176-0x00000000000671E6-mapping.dmp

            • memory/888-181-0x0000000000050000-0x0000000000094000-memory.dmp

              Filesize

              272KB

            • memory/1124-136-0x000007FEFAD81000-0x000007FEFAD83000-memory.dmp

              Filesize

              8KB

            • memory/1124-132-0x000007FEFBB71000-0x000007FEFBB73000-memory.dmp

              Filesize

              8KB

            • memory/1124-137-0x0000000001F50000-0x0000000001F60000-memory.dmp

              Filesize

              64KB

            • memory/1124-143-0x0000000002160000-0x0000000002170000-memory.dmp

              Filesize

              64KB

            • memory/1132-97-0x0000000001F00000-0x0000000001F44000-memory.dmp

              Filesize

              272KB

            • memory/1132-95-0x0000000001F00000-0x0000000001F44000-memory.dmp

              Filesize

              272KB

            • memory/1132-98-0x0000000001F00000-0x0000000001F44000-memory.dmp

              Filesize

              272KB

            • memory/1132-96-0x0000000001F00000-0x0000000001F44000-memory.dmp

              Filesize

              272KB

            • memory/1188-101-0x0000000001DE0000-0x0000000001E24000-memory.dmp

              Filesize

              272KB

            • memory/1188-104-0x0000000001DE0000-0x0000000001E24000-memory.dmp

              Filesize

              272KB

            • memory/1188-103-0x0000000001DE0000-0x0000000001E24000-memory.dmp

              Filesize

              272KB

            • memory/1188-102-0x0000000001DE0000-0x0000000001E24000-memory.dmp

              Filesize

              272KB

            • memory/1220-108-0x0000000002AD0000-0x0000000002B14000-memory.dmp

              Filesize

              272KB

            • memory/1220-107-0x0000000002AD0000-0x0000000002B14000-memory.dmp

              Filesize

              272KB

            • memory/1220-109-0x0000000002AD0000-0x0000000002B14000-memory.dmp

              Filesize

              272KB

            • memory/1220-110-0x0000000002AD0000-0x0000000002B14000-memory.dmp

              Filesize

              272KB

            • memory/1480-68-0x0000000000000000-mapping.dmp

            • memory/1480-194-0x0000000000400000-0x000000000045A000-memory.dmp

              Filesize

              360KB

            • memory/1480-191-0x0000000000570000-0x00000000005B4000-memory.dmp

              Filesize

              272KB

            • memory/1480-156-0x0000000000570000-0x00000000005B4000-memory.dmp

              Filesize

              272KB

            • memory/1552-133-0x0000000000460000-0x00000000004BA000-memory.dmp

              Filesize

              360KB

            • memory/1552-70-0x0000000000460000-0x00000000004BA000-memory.dmp

              Filesize

              360KB

            • memory/1552-115-0x0000000000460000-0x00000000004A4000-memory.dmp

              Filesize

              272KB

            • memory/1552-114-0x0000000000460000-0x00000000004A4000-memory.dmp

              Filesize

              272KB

            • memory/1552-193-0x0000000000460000-0x00000000004BA000-memory.dmp

              Filesize

              360KB

            • memory/1552-192-0x0000000000400000-0x000000000045A000-memory.dmp

              Filesize

              360KB

            • memory/1552-54-0x0000000000400000-0x000000000045A000-memory.dmp

              Filesize

              360KB

            • memory/1552-190-0x0000000000460000-0x00000000004BA000-memory.dmp

              Filesize

              360KB

            • memory/1552-116-0x0000000000460000-0x00000000004A4000-memory.dmp

              Filesize

              272KB

            • memory/1552-117-0x0000000000460000-0x00000000004A4000-memory.dmp

              Filesize

              272KB

            • memory/1720-65-0x0000000000000000-mapping.dmp

            • memory/1720-129-0x0000000001E40000-0x0000000001E84000-memory.dmp

              Filesize

              272KB

            • memory/1720-127-0x0000000001E40000-0x0000000001E84000-memory.dmp

              Filesize

              272KB

            • memory/1720-130-0x0000000001E40000-0x0000000001E84000-memory.dmp

              Filesize

              272KB

            • memory/1720-128-0x0000000001E40000-0x0000000001E84000-memory.dmp

              Filesize

              272KB

            • memory/1720-135-0x0000000001E40000-0x0000000001E84000-memory.dmp

              Filesize

              272KB

            • memory/1748-61-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-58-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-64-0x0000000075681000-0x0000000075683000-memory.dmp

              Filesize

              8KB

            • memory/1748-59-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-71-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-73-0x0000000000380000-0x00000000003DA000-memory.dmp

              Filesize

              360KB

            • memory/1748-177-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-178-0x0000000000380000-0x00000000003C4000-memory.dmp

              Filesize

              272KB

            • memory/1748-62-0x000000000041758F-mapping.dmp

            • memory/1748-134-0x0000000000380000-0x00000000003DA000-memory.dmp

              Filesize

              360KB

            • memory/1748-56-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-55-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1748-121-0x0000000000380000-0x00000000003C4000-memory.dmp

              Filesize

              272KB

            • memory/1748-122-0x0000000000380000-0x00000000003C4000-memory.dmp

              Filesize

              272KB

            • memory/1748-124-0x0000000000380000-0x00000000003C4000-memory.dmp

              Filesize

              272KB

            • memory/1748-123-0x0000000000380000-0x00000000003C4000-memory.dmp

              Filesize

              272KB

            • memory/1748-72-0x0000000000380000-0x00000000003DA000-memory.dmp

              Filesize

              360KB