Analysis

  • max time kernel
    208s
  • max time network
    233s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 14:47

General

  • Target

    f001b3ee80941f7ba2ac1c11b1173d1102fdc16f090d35a7d5bcf56833ccb5dd.exe

  • Size

    361KB

  • MD5

    f5a64b55e5154ef7bc386df96d4d2258

  • SHA1

    fd0d37af8ea14e71f1ec91b7c184c7a03059048c

  • SHA256

    f001b3ee80941f7ba2ac1c11b1173d1102fdc16f090d35a7d5bcf56833ccb5dd

  • SHA512

    f94a5967012b9d622b2aa06bba5c096c299571d8d716a05297481d4fad644aa5ce75be59e0f425f066f86837f0d8480755115cac85fb626e3d5c389aeef0f5cd

  • SSDEEP

    6144:vflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:vflfAsiVGjSGecvX

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • Executes dropped EXE 16 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f001b3ee80941f7ba2ac1c11b1173d1102fdc16f090d35a7d5bcf56833ccb5dd.exe
    "C:\Users\Admin\AppData\Local\Temp\f001b3ee80941f7ba2ac1c11b1173d1102fdc16f090d35a7d5bcf56833ccb5dd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Temp\sqkicausnkfdxvpn.exe
      C:\Temp\sqkicausnkfdxvpn.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\jhczuomhez.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:4304
        • C:\Temp\jhczuomhez.exe
          C:\Temp\jhczuomhez.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2556
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4228
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_jhczuomhez.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:732
        • C:\Temp\i_jhczuomhez.exe
          C:\Temp\i_jhczuomhez.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1484
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\kidavtnlfd.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:768
        • C:\Temp\kidavtnlfd.exe
          C:\Temp\kidavtnlfd.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4148
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:392
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_kidavtnlfd.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4492
        • C:\Temp\i_kidavtnlfd.exe
          C:\Temp\i_kidavtnlfd.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4552
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\igbytrljdb.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:880
        • C:\Temp\igbytrljdb.exe
          C:\Temp\igbytrljdb.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:3484
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3144
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_igbytrljdb.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1532
        • C:\Temp\i_igbytrljdb.exe
          C:\Temp\i_igbytrljdb.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3860
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4972
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b

        • C:\Temp\i_igbytrljdb.exe

          Filesize

          361KB

          MD5

          1fbf1431add5301e7f4e5fea77387d98

          SHA1

          f551ecf247f176754e3ab4e4e2b9039f4642974d

          SHA256

          c606536d6b9ba294a217ccf87a04cdc2eeb821932389f7c0557271b59a698cbf

          SHA512

          fb20013d21d83f7858cb752defd5413c2e3f3d4e053afd25e46ea8014237a1e5cd95fcc63ce5fc47f8aa724d80b82af2b1075cc0a651e32c46011beaf779d9a7

        • C:\Temp\i_igbytrljdb.exe

          Filesize

          361KB

          MD5

          1fbf1431add5301e7f4e5fea77387d98

          SHA1

          f551ecf247f176754e3ab4e4e2b9039f4642974d

          SHA256

          c606536d6b9ba294a217ccf87a04cdc2eeb821932389f7c0557271b59a698cbf

          SHA512

          fb20013d21d83f7858cb752defd5413c2e3f3d4e053afd25e46ea8014237a1e5cd95fcc63ce5fc47f8aa724d80b82af2b1075cc0a651e32c46011beaf779d9a7

        • C:\Temp\i_jhczuomhez.exe

          Filesize

          361KB

          MD5

          97de615974df12d36ce026fda7ef5ddf

          SHA1

          5ba95d52e8bf0199148c0068b6b292f5789776f3

          SHA256

          5c588cfd6b2932ddb35347035689bfd9eb623472664d325d4266d81f949fd624

          SHA512

          587d3440876a7e9e32dc81ff374eb98105181d4a1b91523fdca93b2b252c9390127593d8e65b66abe49b69444081feb02f3ca19948b5a819364f1d1d140a5531

        • C:\Temp\i_jhczuomhez.exe

          Filesize

          361KB

          MD5

          97de615974df12d36ce026fda7ef5ddf

          SHA1

          5ba95d52e8bf0199148c0068b6b292f5789776f3

          SHA256

          5c588cfd6b2932ddb35347035689bfd9eb623472664d325d4266d81f949fd624

          SHA512

          587d3440876a7e9e32dc81ff374eb98105181d4a1b91523fdca93b2b252c9390127593d8e65b66abe49b69444081feb02f3ca19948b5a819364f1d1d140a5531

        • C:\Temp\i_kidavtnlfd.exe

          Filesize

          361KB

          MD5

          70eef0b550fc3d4f6c209f9611bdf477

          SHA1

          4c837a30d165c2daa9e07c3a5d787d8c6264930c

          SHA256

          5f19769d640f0422f642a8063138f8d0a088693c9d36719a2722a98e8dee0e9a

          SHA512

          f82156484c73ccb1fc59092ad6a703ea3f4826aad0a59e82c6dba2bee0e86c48a4b2f5b7854b188196a8992e78a2a9c902aaf12199626fdfdc4c1391faf24dc7

        • C:\Temp\i_kidavtnlfd.exe

          Filesize

          361KB

          MD5

          70eef0b550fc3d4f6c209f9611bdf477

          SHA1

          4c837a30d165c2daa9e07c3a5d787d8c6264930c

          SHA256

          5f19769d640f0422f642a8063138f8d0a088693c9d36719a2722a98e8dee0e9a

          SHA512

          f82156484c73ccb1fc59092ad6a703ea3f4826aad0a59e82c6dba2bee0e86c48a4b2f5b7854b188196a8992e78a2a9c902aaf12199626fdfdc4c1391faf24dc7

        • C:\Temp\igbytrljdb.exe

          Filesize

          361KB

          MD5

          dfc19cc97f8a8e83725f2205c0d7a80d

          SHA1

          59d12f9be511de2a40723f882721b3fad3dc1923

          SHA256

          c96d359c85fe11a053d111239558afc53766fa5980547031ee9289d10d235ff5

          SHA512

          20c2f0851a21e19439577a9f0ed890e97169439709e5c48ed96f44e6269147f544f25c890999b1984629329a84dbd1d76306f1daead865260f9b8dab9341c506

        • C:\Temp\igbytrljdb.exe

          Filesize

          361KB

          MD5

          dfc19cc97f8a8e83725f2205c0d7a80d

          SHA1

          59d12f9be511de2a40723f882721b3fad3dc1923

          SHA256

          c96d359c85fe11a053d111239558afc53766fa5980547031ee9289d10d235ff5

          SHA512

          20c2f0851a21e19439577a9f0ed890e97169439709e5c48ed96f44e6269147f544f25c890999b1984629329a84dbd1d76306f1daead865260f9b8dab9341c506

        • C:\Temp\jhczuomhez.exe

          Filesize

          361KB

          MD5

          3cffc0ba4a99736279b70a065a8303c1

          SHA1

          ebc5ec00967f930e1ffd076ec11eedf2f07ffa46

          SHA256

          07784d63fcbbf9dd63693693649327a0c5b3bc13ece3800e3528b923605ba882

          SHA512

          188c6ae44007775451c9761ae4da77754bce259b2015024d9e3ef151c6effdb1de29c22a82a34ad67d3833a7fbe8d808197a11c5a175b1413843d8c465f811a1

        • C:\Temp\jhczuomhez.exe

          Filesize

          361KB

          MD5

          3cffc0ba4a99736279b70a065a8303c1

          SHA1

          ebc5ec00967f930e1ffd076ec11eedf2f07ffa46

          SHA256

          07784d63fcbbf9dd63693693649327a0c5b3bc13ece3800e3528b923605ba882

          SHA512

          188c6ae44007775451c9761ae4da77754bce259b2015024d9e3ef151c6effdb1de29c22a82a34ad67d3833a7fbe8d808197a11c5a175b1413843d8c465f811a1

        • C:\Temp\kidavtnlfd.exe

          Filesize

          361KB

          MD5

          bb015b3655c89553b5d2eab97789c18e

          SHA1

          7efc02843558c9b3d14ca996e2322e45965750e5

          SHA256

          56a7f8262d36a8e7da59ce85113f770920aa36ce63986b7201fa3fa988702ba8

          SHA512

          23d9e8521325d78c102f8f3e2565236e9e611018487765b5fc243d12279f9ffa27e31c403e146e59dd2c42b659f94e10c7d189590c4452d3196e3aa780429036

        • C:\Temp\kidavtnlfd.exe

          Filesize

          361KB

          MD5

          bb015b3655c89553b5d2eab97789c18e

          SHA1

          7efc02843558c9b3d14ca996e2322e45965750e5

          SHA256

          56a7f8262d36a8e7da59ce85113f770920aa36ce63986b7201fa3fa988702ba8

          SHA512

          23d9e8521325d78c102f8f3e2565236e9e611018487765b5fc243d12279f9ffa27e31c403e146e59dd2c42b659f94e10c7d189590c4452d3196e3aa780429036

        • C:\Temp\sqkicausnkfdxvpn.exe

          Filesize

          361KB

          MD5

          d9a1e426bfc93742a10123dc6000cbba

          SHA1

          d2fd311cd7b72b01e310c71a65b20542b56599bc

          SHA256

          85ea509c7daeeefbc99522b4d715972a701733292a37669a992e215db5c4b27c

          SHA512

          5fe5f6f2e1ddb6d533d1432292f10cb9b76fe645677b4d4fceb1c2da37f3cb019facacb172963cf085a6733b64e13e6be6ab8a0de7a9f6110a9849eb8a44e49b

        • C:\Temp\sqkicausnkfdxvpn.exe

          Filesize

          361KB

          MD5

          d9a1e426bfc93742a10123dc6000cbba

          SHA1

          d2fd311cd7b72b01e310c71a65b20542b56599bc

          SHA256

          85ea509c7daeeefbc99522b4d715972a701733292a37669a992e215db5c4b27c

          SHA512

          5fe5f6f2e1ddb6d533d1432292f10cb9b76fe645677b4d4fceb1c2da37f3cb019facacb172963cf085a6733b64e13e6be6ab8a0de7a9f6110a9849eb8a44e49b

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          d46b9b43bc16536f2a8260f21ec8acc2

          SHA1

          f853d8d52880dc52bd6d4bfcd633a66e6d00077d

          SHA256

          ba8cdfc839461fb3ddb37d36e98a210a760e0eaa1643efcc2fe4a24eae2c3d4d

          SHA512

          09c44d3c4722302b72a61f7085bcdaa644eedc9ce7638c2634c516ea0c4f8ad6db0f21cc68cd9d361db54a8f16d39b7eccdaf9ae36c6ebceee0824a3cabc135b