Analysis

  • max time kernel
    71s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 06:00

General

  • Target

    078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe

  • Size

    53KB

  • MD5

    a3e04bbed3d52a5489f9c8f008f00abb

  • SHA1

    53fbeab1b307d219a832dffce04ff6766a07123f

  • SHA256

    078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf

  • SHA512

    b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6

  • SSDEEP

    768:al6Fe6EshVE1xoOhcK4dckK48hbjncEn1VInpUdPYCVkbsnnf5WLs1nNxmha5j:Re1shVEoyp4dg4+7cu1EWdNyswLs1mM

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe
    "C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\SysWOW64\Rundll32.exe
      C:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\tunsj.fon",MyKILLEntry
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1376
    • C:\Windows\SysWOW64\SysAnti.exe
      C:\Windows\System32\SysAnti.exe -One
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\SysWOW64\Rundll32.exe
        C:\Windows\System32\Rundll32.exe "C:\Windows\Fonts\snnfl.fon",MyKILLEntry
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c erase /F "C:\Windows\SysWOW64\SysAnti.exe" > nul
        3⤵
          PID:1464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf.exe" > nul
        2⤵
        • Deletes itself
        PID:1528

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Fonts\snnfl.fon
      Filesize

      14KB

      MD5

      2c0bb5c2c1f4a8ec217fd50867908b57

      SHA1

      4dd7f870ae7e7833059fd28fb900f3fe38bba64f

      SHA256

      bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4

      SHA512

      11fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b

    • C:\Windows\Fonts\tunsj.fon
      Filesize

      14KB

      MD5

      2c0bb5c2c1f4a8ec217fd50867908b57

      SHA1

      4dd7f870ae7e7833059fd28fb900f3fe38bba64f

      SHA256

      bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4

      SHA512

      11fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b

    • C:\Windows\SysWOW64\SysAnti.exe
      Filesize

      53KB

      MD5

      a3e04bbed3d52a5489f9c8f008f00abb

      SHA1

      53fbeab1b307d219a832dffce04ff6766a07123f

      SHA256

      078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf

      SHA512

      b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6

    • C:\Windows\SysWOW64\SysAnti.exe
      Filesize

      53KB

      MD5

      a3e04bbed3d52a5489f9c8f008f00abb

      SHA1

      53fbeab1b307d219a832dffce04ff6766a07123f

      SHA256

      078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf

      SHA512

      b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6

    • \Windows\Fonts\snnfl.fon
      Filesize

      14KB

      MD5

      2c0bb5c2c1f4a8ec217fd50867908b57

      SHA1

      4dd7f870ae7e7833059fd28fb900f3fe38bba64f

      SHA256

      bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4

      SHA512

      11fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b

    • \Windows\Fonts\tunsj.fon
      Filesize

      14KB

      MD5

      2c0bb5c2c1f4a8ec217fd50867908b57

      SHA1

      4dd7f870ae7e7833059fd28fb900f3fe38bba64f

      SHA256

      bd200384b301a0ebccd42f1caa6543957a660f32120a02da3a53c4b9d9773bc4

      SHA512

      11fb5f717346c244484d8dd651cc9740dc368e1c6cf0efdfb8d91b6ebca6aa059214221e44ab712d6ebff7e605792ac5b38a5d0116f7ee503edcf438fb3c210b

    • \Windows\SysWOW64\SysAnti.exe
      Filesize

      53KB

      MD5

      a3e04bbed3d52a5489f9c8f008f00abb

      SHA1

      53fbeab1b307d219a832dffce04ff6766a07123f

      SHA256

      078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf

      SHA512

      b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6

    • \Windows\SysWOW64\SysAnti.exe
      Filesize

      53KB

      MD5

      a3e04bbed3d52a5489f9c8f008f00abb

      SHA1

      53fbeab1b307d219a832dffce04ff6766a07123f

      SHA256

      078b88cbf4c1684e3a31cd0eefe589132cfb09560821e33c05e44d9bdd4feecf

      SHA512

      b9b348c008fc94c01fd27000f2990391a4682b83b865aefe74bdca700ad3d645f458d7ba36cef2d9ecc8d3e3ab2693ca809b85fae21f7c51d9466dbe630deae6

    • memory/564-65-0x0000000000000000-mapping.dmp
    • memory/564-74-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/696-69-0x0000000000000000-mapping.dmp
    • memory/696-78-0x0000000000160000-0x0000000000179000-memory.dmp
      Filesize

      100KB

    • memory/696-76-0x0000000000160000-0x0000000000179000-memory.dmp
      Filesize

      100KB

    • memory/1372-72-0x0000000002160000-0x0000000002184000-memory.dmp
      Filesize

      144KB

    • memory/1372-55-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1372-73-0x0000000002160000-0x0000000002184000-memory.dmp
      Filesize

      144KB

    • memory/1372-54-0x0000000075921000-0x0000000075923000-memory.dmp
      Filesize

      8KB

    • memory/1372-77-0x0000000002160000-0x0000000002184000-memory.dmp
      Filesize

      144KB

    • memory/1372-61-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1372-81-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/1376-60-0x00000000000F0000-0x0000000000109000-memory.dmp
      Filesize

      100KB

    • memory/1376-56-0x0000000000000000-mapping.dmp
    • memory/1376-62-0x00000000000F0000-0x0000000000109000-memory.dmp
      Filesize

      100KB

    • memory/1464-79-0x0000000000000000-mapping.dmp
    • memory/1528-80-0x0000000000000000-mapping.dmp