Analysis

  • max time kernel
    184s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 18:38

General

  • Target

    ihre_festnetz_rechnung_november_2014_54_7_0_2_8_00000390002_210_22_41_66_00000007.exe

  • Size

    168KB

  • MD5

    60e3cb5dd482ce771d0e5c6576a8269c

  • SHA1

    33573fa6ad2ac27d48bd3ef1f84739449ec4b682

  • SHA256

    37d254df44c84c208156c066068f2397e57413affd480a80dc01d0b2eb0cbb31

  • SHA512

    bf2fab79ed0dd3fe763f6e2a0b809454536a5335ef29ebea40d562f2b745d695489d9d3039ab0f79b9f982863bfa0a266996c827b2338712f61965077e65eaa8

  • SSDEEP

    3072:CdLyZlwEyKcoO29Y5eCPN2bViTphJP12EFs+NLVgu2TVAOWX:sLaw7F3CY5e+CVi/yEXlVh2hk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ihre_festnetz_rechnung_november_2014_54_7_0_2_8_00000390002_210_22_41_66_00000007.exe
    "C:\Users\Admin\AppData\Local\Temp\ihre_festnetz_rechnung_november_2014_54_7_0_2_8_00000390002_210_22_41_66_00000007.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Users\Admin\AppData\Local\Temp\ihre_festnetz_rechnung_november_2014_54_7_0_2_8_00000390002_210_22_41_66_00000007.exe
      C:\Users\Admin\AppData\Local\Temp\ihre_festnetz_rechnung_november_2014_54_7_0_2_8_00000390002_210_22_41_66_00000007.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS6747~1.BAT"
        3⤵
        • Deletes itself
        PID:832
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1252
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1188
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1128
      • C:\Windows\system32\conhost.exe
        \??\C:\Windows\system32\conhost.exe "371639937-1550695799392767421066594319-41650781-1145440702-3288159681746029166"
        1⤵
          PID:1768

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\ms6747145.bat

          Filesize

          201B

          MD5

          4cae181a8896e259f10b5a2a2991a88b

          SHA1

          8874876acf74828d3f471558b6fae1ff13844cb7

          SHA256

          70920bdba9cc2065de68add460bcb3dd58a26c36611f022fbc5272611446b90e

          SHA512

          77857bc188f9cb7915b128591035336c8bc92f299fb266fd45d103ee465299e9d852708862dc4be6fa916b5fa53eec4429b4bf6b7365b7a3895cb911fff85798

        • memory/576-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

          Filesize

          8KB

        • memory/576-65-0x00000000002F0000-0x00000000002F4000-memory.dmp

          Filesize

          16KB

        • memory/768-60-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-71-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-62-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-63-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-64-0x00000000004010C0-mapping.dmp

        • memory/768-67-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-56-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-58-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/768-55-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/832-72-0x0000000000000000-mapping.dmp

        • memory/832-81-0x0000000000080000-0x0000000000094000-memory.dmp

          Filesize

          80KB

        • memory/1128-96-0x0000000001D20000-0x0000000001D37000-memory.dmp

          Filesize

          92KB

        • memory/1128-79-0x00000000372B0000-0x00000000372C0000-memory.dmp

          Filesize

          64KB

        • memory/1188-83-0x00000000372B0000-0x00000000372C0000-memory.dmp

          Filesize

          64KB

        • memory/1188-97-0x0000000000120000-0x0000000000137000-memory.dmp

          Filesize

          92KB

        • memory/1252-73-0x0000000002A70000-0x0000000002A87000-memory.dmp

          Filesize

          92KB

        • memory/1252-75-0x00000000372B0000-0x00000000372C0000-memory.dmp

          Filesize

          64KB

        • memory/1252-95-0x0000000002A70000-0x0000000002A87000-memory.dmp

          Filesize

          92KB

        • memory/1768-91-0x00000000372B0000-0x00000000372C0000-memory.dmp

          Filesize

          64KB

        • memory/1768-93-0x00000000002D0000-0x00000000002E7000-memory.dmp

          Filesize

          92KB

        • memory/1768-94-0x00000000002B0000-0x00000000002C7000-memory.dmp

          Filesize

          92KB

        • memory/1768-90-0x00000000372B0000-0x00000000372C0000-memory.dmp

          Filesize

          64KB