Analysis

  • max time kernel
    150s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 17:11

General

  • Target

    f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0.exe

  • Size

    196KB

  • MD5

    cd2299ac93a4c5d9f881b3825055d113

  • SHA1

    b34f80e6be296926606ec989d5d38c6ea0fd7cf0

  • SHA256

    f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0

  • SHA512

    68e7ee2849662992f2f465763dc1a1080007fe4572e317f30d04ea3418c9f92dbb46c7c1e7f8ed141a91ed98b6c7b186a2e99668efad1952a3c9cdd2f1ffdef5

  • SSDEEP

    6144:4de8qw48dGF6XOv80NNGtTArqNI+FMmZ6C:4dQwIFeSBjGtTbN3u

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1192
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1284
        • C:\Users\Admin\AppData\Local\Temp\f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0.exe
          "C:\Users\Admin\AppData\Local\Temp\f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Users\Admin\AppData\Local\Temp\f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0.exe
            "C:\Users\Admin\AppData\Local\Temp\f1bc5bd7510a4684282f3244e2d4fa15dc8cbc7f78d8867d02c455a0bc0eb7d0.exe"
            3⤵
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1796
            • C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe
              "C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:276
              • C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe
                "C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1328
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp618982f1.bat"
              4⤵
              • Deletes itself
              PID:1916
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1220
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:560
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1620
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1776
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1580

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmp618982f1.bat

                  Filesize

                  307B

                  MD5

                  e571c50d40dba784b5f5891113e1b58d

                  SHA1

                  d87cdcc788a158ba5eb1eff420d2e3cb643c2993

                  SHA256

                  c77ca57bc194ad6c61566cd60ade94a0d301b2eb903c0d1eab235687e4bdd876

                  SHA512

                  c2991bb1d1ddcf10673a4a460dde4bf29a9227e60ce39ac4487dc1101dccce4aa53dd9a8bdc3e6bd18d5ea1405bdb1f127b3a3f4525fedd388091b44cd3d4ce7

                • C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe

                  Filesize

                  196KB

                  MD5

                  6265afa0a3cc477970b49a677b8af176

                  SHA1

                  744d53095f7960982d3b4f89b7e1ca23e0c42230

                  SHA256

                  c55f8965ce1390e115d8d407f726ea4c44d6a823ec61794e78ae0ca47ca064b5

                  SHA512

                  5bcd922cc039d3f0a11ace8f0ba71bd8301209b08551e6747c0c2084a6ac12d722d256d502a1f1f44abdde99cbc8b153281205552c46ef1ddcc43df3a630ee1c

                • C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe

                  Filesize

                  196KB

                  MD5

                  6265afa0a3cc477970b49a677b8af176

                  SHA1

                  744d53095f7960982d3b4f89b7e1ca23e0c42230

                  SHA256

                  c55f8965ce1390e115d8d407f726ea4c44d6a823ec61794e78ae0ca47ca064b5

                  SHA512

                  5bcd922cc039d3f0a11ace8f0ba71bd8301209b08551e6747c0c2084a6ac12d722d256d502a1f1f44abdde99cbc8b153281205552c46ef1ddcc43df3a630ee1c

                • C:\Users\Admin\AppData\Roaming\Axhih\saeql.exe

                  Filesize

                  196KB

                  MD5

                  6265afa0a3cc477970b49a677b8af176

                  SHA1

                  744d53095f7960982d3b4f89b7e1ca23e0c42230

                  SHA256

                  c55f8965ce1390e115d8d407f726ea4c44d6a823ec61794e78ae0ca47ca064b5

                  SHA512

                  5bcd922cc039d3f0a11ace8f0ba71bd8301209b08551e6747c0c2084a6ac12d722d256d502a1f1f44abdde99cbc8b153281205552c46ef1ddcc43df3a630ee1c

                • \Users\Admin\AppData\Roaming\Axhih\saeql.exe

                  Filesize

                  196KB

                  MD5

                  6265afa0a3cc477970b49a677b8af176

                  SHA1

                  744d53095f7960982d3b4f89b7e1ca23e0c42230

                  SHA256

                  c55f8965ce1390e115d8d407f726ea4c44d6a823ec61794e78ae0ca47ca064b5

                  SHA512

                  5bcd922cc039d3f0a11ace8f0ba71bd8301209b08551e6747c0c2084a6ac12d722d256d502a1f1f44abdde99cbc8b153281205552c46ef1ddcc43df3a630ee1c

                • memory/276-88-0x0000000074C60000-0x000000007520B000-memory.dmp

                  Filesize

                  5.7MB

                • memory/560-120-0x0000000000210000-0x0000000000237000-memory.dmp

                  Filesize

                  156KB

                • memory/560-118-0x0000000000210000-0x0000000000237000-memory.dmp

                  Filesize

                  156KB

                • memory/560-117-0x0000000000210000-0x0000000000237000-memory.dmp

                  Filesize

                  156KB

                • memory/560-119-0x0000000000210000-0x0000000000237000-memory.dmp

                  Filesize

                  156KB

                • memory/916-67-0x0000000074CE0000-0x000000007528B000-memory.dmp

                  Filesize

                  5.7MB

                • memory/916-54-0x0000000075831000-0x0000000075833000-memory.dmp

                  Filesize

                  8KB

                • memory/916-55-0x0000000074CE0000-0x000000007528B000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1192-94-0x0000000001C60000-0x0000000001C87000-memory.dmp

                  Filesize

                  156KB

                • memory/1192-97-0x0000000001C60000-0x0000000001C87000-memory.dmp

                  Filesize

                  156KB

                • memory/1192-96-0x0000000001C60000-0x0000000001C87000-memory.dmp

                  Filesize

                  156KB

                • memory/1192-98-0x0000000001C60000-0x0000000001C87000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-102-0x00000000001D0000-0x00000000001F7000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-101-0x00000000001D0000-0x00000000001F7000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-103-0x00000000001D0000-0x00000000001F7000-memory.dmp

                  Filesize

                  156KB

                • memory/1220-104-0x00000000001D0000-0x00000000001F7000-memory.dmp

                  Filesize

                  156KB

                • memory/1284-107-0x0000000002A00000-0x0000000002A27000-memory.dmp

                  Filesize

                  156KB

                • memory/1284-108-0x0000000002A00000-0x0000000002A27000-memory.dmp

                  Filesize

                  156KB

                • memory/1284-110-0x0000000002A00000-0x0000000002A27000-memory.dmp

                  Filesize

                  156KB

                • memory/1284-109-0x0000000002A00000-0x0000000002A27000-memory.dmp

                  Filesize

                  156KB

                • memory/1328-114-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1620-124-0x0000000003A70000-0x0000000003A97000-memory.dmp

                  Filesize

                  156KB

                • memory/1620-125-0x0000000003A70000-0x0000000003A97000-memory.dmp

                  Filesize

                  156KB

                • memory/1620-126-0x0000000003A70000-0x0000000003A97000-memory.dmp

                  Filesize

                  156KB

                • memory/1620-123-0x0000000003A70000-0x0000000003A97000-memory.dmp

                  Filesize

                  156KB

                • memory/1776-129-0x0000000001D30000-0x0000000001D57000-memory.dmp

                  Filesize

                  156KB

                • memory/1776-130-0x0000000001D30000-0x0000000001D57000-memory.dmp

                  Filesize

                  156KB

                • memory/1776-131-0x0000000001D30000-0x0000000001D57000-memory.dmp

                  Filesize

                  156KB

                • memory/1776-132-0x0000000001D30000-0x0000000001D57000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-95-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-72-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-60-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-59-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-57-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-56-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-62-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-71-0x000000000040B000-0x000000000040D000-memory.dmp

                  Filesize

                  8KB

                • memory/1796-66-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-68-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-69-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1796-70-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB