Analysis

  • max time kernel
    155s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 06:13

General

  • Target

    87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe

  • Size

    185KB

  • MD5

    44a9cb54256b78f76ac494cee40a9e8b

  • SHA1

    b20dcbe5839ce6df957e9b68c259840d5908a825

  • SHA256

    87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227

  • SHA512

    da0edc275592ada687b2359c972080ff22e210e5588b990f741ab413b8ad07c045558f1d000a192627fc457a0146b1e5009cff0829aa817a953adda5e818783d

  • SSDEEP

    3072:3ar0meAs22kChLmrRvDB1R1hFYetoFspICx9OQp7bXXVKcm0anNtIB3flcTIBr:360db2DChmrVND15pIC9OQp7TIcKNtOf

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe
      "C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe
        "C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe
          "C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe
            "C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:300
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4dee54c5.bat"
          3⤵
          • Deletes itself
          • Suspicious use of AdjustPrivilegeToken
          PID:1108
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1200
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1164
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-377856481213443954-16219504382098023873-514223886909486486-10784275-1817288607"
          1⤵
            PID:1552
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1608
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:888
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1152

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\tmp4dee54c5.bat

                Filesize

                307B

                MD5

                b51f8c8a9dce5b4d726fe403b5aaf941

                SHA1

                821bac23eb81efb9609e48fe91dbb9d2f937274d

                SHA256

                28addb75c7bb35ae7aff2ad4d0b049f946b800ee7ff35d3093f08b7ef7f3443a

                SHA512

                0b7fcdd80b7666a9aa8eca69258e786a1ab95671422544a4141bce422b487ad4faa52ff47d2b92ab6939a905c780abaf3aa6c3272a934a3e49260213d1ef9eba

              • C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe

                Filesize

                185KB

                MD5

                e017075c7b1a4fa69b6e029ad5745f5b

                SHA1

                68345abf6542f027d7a5774163b1c096e1777e12

                SHA256

                309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f

                SHA512

                e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796

              • C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe

                Filesize

                185KB

                MD5

                e017075c7b1a4fa69b6e029ad5745f5b

                SHA1

                68345abf6542f027d7a5774163b1c096e1777e12

                SHA256

                309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f

                SHA512

                e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796

              • C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe

                Filesize

                185KB

                MD5

                e017075c7b1a4fa69b6e029ad5745f5b

                SHA1

                68345abf6542f027d7a5774163b1c096e1777e12

                SHA256

                309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f

                SHA512

                e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796

              • C:\Users\Admin\AppData\Roaming\Nebu\eptoy.tei

                Filesize

                4KB

                MD5

                7d0715ffba7e980acdcc579ff1dd4ace

                SHA1

                2fd8e053a3a043960c748b828da730e3e7be8744

                SHA256

                8fa5d192a285d8f3ae4ab9db3d9080b52dcedabb86eeecda74326beec94ca089

                SHA512

                dc85b8a468c4a40e0c9f515b97eabf3b42d4305694f87c84c3952275a64889d5aec94b293b72a8d1565f2744094af1ccd1dc62b1c26e1cc477b870ffe52d7bf7

              • C:\Users\Admin\AppData\Roaming\Nebu\eptoy.tei

                Filesize

                4KB

                MD5

                7d0715ffba7e980acdcc579ff1dd4ace

                SHA1

                2fd8e053a3a043960c748b828da730e3e7be8744

                SHA256

                8fa5d192a285d8f3ae4ab9db3d9080b52dcedabb86eeecda74326beec94ca089

                SHA512

                dc85b8a468c4a40e0c9f515b97eabf3b42d4305694f87c84c3952275a64889d5aec94b293b72a8d1565f2744094af1ccd1dc62b1c26e1cc477b870ffe52d7bf7

              • \Users\Admin\AppData\Roaming\Ifko\quyso.exe

                Filesize

                185KB

                MD5

                e017075c7b1a4fa69b6e029ad5745f5b

                SHA1

                68345abf6542f027d7a5774163b1c096e1777e12

                SHA256

                309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f

                SHA512

                e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796

              • \Users\Admin\AppData\Roaming\Ifko\quyso.exe

                Filesize

                185KB

                MD5

                e017075c7b1a4fa69b6e029ad5745f5b

                SHA1

                68345abf6542f027d7a5774163b1c096e1777e12

                SHA256

                309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f

                SHA512

                e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796

              • memory/300-266-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/300-81-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1108-124-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-285-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-251-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-128-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-114-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-113-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-115-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-118-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-132-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-130-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-120-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-126-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-111-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1108-122-0x0000000000050000-0x000000000008C000-memory.dmp

                Filesize

                240KB

              • memory/1120-87-0x0000000001E60000-0x0000000001E9C000-memory.dmp

                Filesize

                240KB

              • memory/1120-86-0x0000000001E60000-0x0000000001E9C000-memory.dmp

                Filesize

                240KB

              • memory/1120-85-0x0000000001E60000-0x0000000001E9C000-memory.dmp

                Filesize

                240KB

              • memory/1120-84-0x0000000001E60000-0x0000000001E9C000-memory.dmp

                Filesize

                240KB

              • memory/1164-92-0x00000000002E0000-0x000000000031C000-memory.dmp

                Filesize

                240KB

              • memory/1164-91-0x00000000002E0000-0x000000000031C000-memory.dmp

                Filesize

                240KB

              • memory/1164-90-0x00000000002E0000-0x000000000031C000-memory.dmp

                Filesize

                240KB

              • memory/1164-93-0x00000000002E0000-0x000000000031C000-memory.dmp

                Filesize

                240KB

              • memory/1200-97-0x0000000002680000-0x00000000026BC000-memory.dmp

                Filesize

                240KB

              • memory/1200-96-0x0000000002680000-0x00000000026BC000-memory.dmp

                Filesize

                240KB

              • memory/1200-98-0x0000000002680000-0x00000000026BC000-memory.dmp

                Filesize

                240KB

              • memory/1200-99-0x0000000002680000-0x00000000026BC000-memory.dmp

                Filesize

                240KB

              • memory/1596-105-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-107-0x0000000000310000-0x000000000035A000-memory.dmp

                Filesize

                296KB

              • memory/1596-103-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-106-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-54-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-104-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-108-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-102-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-243-0x0000000000310000-0x000000000034C000-memory.dmp

                Filesize

                240KB

              • memory/1596-60-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-58-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-63-0x00000000767D1000-0x00000000767D3000-memory.dmp

                Filesize

                8KB

              • memory/1596-57-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-64-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB

              • memory/1596-55-0x0000000000400000-0x000000000043C000-memory.dmp

                Filesize

                240KB