Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 05:18

General

  • Target

    92b708222922ab33f2ed89bfda8c4fc71fda996896d2e816708adf0f27fed11f.exe

  • Size

    141KB

  • MD5

    e030ff10bd3693b025b36fb2a6923d44

  • SHA1

    3ce3feef6fd20089d6b24cb7920368064f22f220

  • SHA256

    92b708222922ab33f2ed89bfda8c4fc71fda996896d2e816708adf0f27fed11f

  • SHA512

    65bc61f6f2ea9ef9cfcaebc7602063246983536eda00a3d86046a6d78b85f050e035b451d88adf1b6b4059aa48d035bbdfabc8e37ed27c63c0487ba6aad43792

  • SSDEEP

    3072:4flOchKvRfVBs9fi57z/gaseA8Sl0Wmacf:4HhqRfV6iBDselV9f

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92b708222922ab33f2ed89bfda8c4fc71fda996896d2e816708adf0f27fed11f.exe
    "C:\Users\Admin\AppData\Local\Temp\92b708222922ab33f2ed89bfda8c4fc71fda996896d2e816708adf0f27fed11f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      C:\Users\Admin\AppData\Local\Temp\1.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\system32\HIMYM.DLL,DW
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        PID:4752
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\1.exe"
        3⤵
          PID:1060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\92b708222922ab33f2ed89bfda8c4fc71fda996896d2e816708adf0f27fed11f.exe"
        2⤵
          PID:1796

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        80.1MB

        MD5

        e96e48358ba1e75e8d24374416d4cd5e

        SHA1

        623c9f3dd387692c199447171f0d794d48aa5679

        SHA256

        6440142c67356ef12dba13a6bfc27c6da1a2fc906714b518225a29546f5e9a77

        SHA512

        f830d06d0c2351e1c632c95dd107c337ee7fca093961f74b037b3138545f0010f4bad588a69f5d68da6972ae78ce7873db111bf717055bbc1036c7db0d11ce2f

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        80.1MB

        MD5

        e96e48358ba1e75e8d24374416d4cd5e

        SHA1

        623c9f3dd387692c199447171f0d794d48aa5679

        SHA256

        6440142c67356ef12dba13a6bfc27c6da1a2fc906714b518225a29546f5e9a77

        SHA512

        f830d06d0c2351e1c632c95dd107c337ee7fca093961f74b037b3138545f0010f4bad588a69f5d68da6972ae78ce7873db111bf717055bbc1036c7db0d11ce2f

      • C:\Windows\SysWOW64\HIMYM.DLL
        Filesize

        92KB

        MD5

        4190846c5202983c636476eac5b979aa

        SHA1

        3bcac44ead53c96124f48f10ee1f1c6b568c0488

        SHA256

        65c5c4e9908c5a3ddccbc2ed8073276e37bcfbcfe9aa25843e0789c5d88c7dfb

        SHA512

        d9a621a13195b4958b01e6960b15ee765f811313818a88876a9369a8eccdcd7e66f60c28bd8010d86f1ee9b8109278ef7bba6be4a9a13927cd746b3777adc63b

      • C:\Windows\SysWOW64\HIMYM.DLL
        Filesize

        92KB

        MD5

        4190846c5202983c636476eac5b979aa

        SHA1

        3bcac44ead53c96124f48f10ee1f1c6b568c0488

        SHA256

        65c5c4e9908c5a3ddccbc2ed8073276e37bcfbcfe9aa25843e0789c5d88c7dfb

        SHA512

        d9a621a13195b4958b01e6960b15ee765f811313818a88876a9369a8eccdcd7e66f60c28bd8010d86f1ee9b8109278ef7bba6be4a9a13927cd746b3777adc63b

      • memory/1060-143-0x0000000000000000-mapping.dmp
      • memory/1628-138-0x0000000000400000-0x0000000001400000-memory.dmp
        Filesize

        16.0MB

      • memory/1628-132-0x0000000000000000-mapping.dmp
      • memory/1628-139-0x000000000C260000-0x000000000C29A000-memory.dmp
        Filesize

        232KB

      • memory/1628-137-0x0000000000400000-0x0000000001400000-memory.dmp
        Filesize

        16.0MB

      • memory/1628-136-0x0000000000400000-0x0000000001400000-memory.dmp
        Filesize

        16.0MB

      • memory/1628-144-0x0000000000400000-0x0000000001400000-memory.dmp
        Filesize

        16.0MB

      • memory/1796-134-0x0000000000000000-mapping.dmp
      • memory/4752-140-0x0000000000000000-mapping.dmp