Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:22

General

  • Target

    56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe

  • Size

    359KB

  • MD5

    78ea828e9434fbe1ca631f2d812bb603

  • SHA1

    6d24bb6271b60926a2842060f4cca46900833d5f

  • SHA256

    56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b

  • SHA512

    a19127383ba86e6a649bbd076b88e31167841797b00b2b95a82332f520db998e319dfb4f7edfc18908cf3f1ce26b3332a1e9530d1fe137aabdbadba4911408fe

  • SSDEEP

    6144:03lgk4W2GD/X1ku/xUffWkMk4T5iup7blk2k7uEcldPlLWAfTfb90tTU:VcD/X1//Wnb65lJgk9yAh

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe
        "C:\Users\Admin\AppData\Local\Temp\56d2850272256c0312f8d6484c69d97dbfa15870a368153fa93734bab829c21b.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe
          "C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp141446b4.bat"
          3⤵
          • Deletes itself
          PID:1272
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1188
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp141446b4.bat

          Filesize

          307B

          MD5

          1e196cf6a0e2741d4287aa52bc24f245

          SHA1

          ab8296b7391990eb745d3e2b6f9a44946771332d

          SHA256

          3c457c10990f929cfea6a5409eaf1e55122dafb7fd55d1d5011a092bf074cea8

          SHA512

          f65328edc14295a53db4e24a40e2b048d59313e78ad03e6db6def6a233777f311f8d18d4238ffb1603424c5def4e6063f1a7f9b602e394ae5635109bc9551292

        • C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe

          Filesize

          359KB

          MD5

          d91329da5c98f1bb5b48c5e535fcee6b

          SHA1

          816987507e4304eef861caedf1c4d643967af0bf

          SHA256

          d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207

          SHA512

          99d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17

        • C:\Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe

          Filesize

          359KB

          MD5

          d91329da5c98f1bb5b48c5e535fcee6b

          SHA1

          816987507e4304eef861caedf1c4d643967af0bf

          SHA256

          d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207

          SHA512

          99d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17

        • \Users\Admin\AppData\Roaming\Aceqe\uzwyma.exe

          Filesize

          359KB

          MD5

          d91329da5c98f1bb5b48c5e535fcee6b

          SHA1

          816987507e4304eef861caedf1c4d643967af0bf

          SHA256

          d0056406260837dda666d89715e6980246727d28eeafceb2c5f05c625a6e1207

          SHA512

          99d1f8a60fff7e8c68fdb77ba9d1cf86ec041b4212d4f48702f1ac738835dfb35a6eae48b12e185cdb9edeff722a77ba13094133b72ea30912c4f27170307f17

        • memory/1116-65-0x0000000001DB0000-0x0000000001DFC000-memory.dmp

          Filesize

          304KB

        • memory/1116-67-0x0000000001DB0000-0x0000000001DFC000-memory.dmp

          Filesize

          304KB

        • memory/1116-66-0x0000000001DB0000-0x0000000001DFC000-memory.dmp

          Filesize

          304KB

        • memory/1116-62-0x0000000001DB0000-0x0000000001DFC000-memory.dmp

          Filesize

          304KB

        • memory/1116-64-0x0000000001DB0000-0x0000000001DFC000-memory.dmp

          Filesize

          304KB

        • memory/1188-70-0x0000000000130000-0x000000000017C000-memory.dmp

          Filesize

          304KB

        • memory/1188-71-0x0000000000130000-0x000000000017C000-memory.dmp

          Filesize

          304KB

        • memory/1188-72-0x0000000000130000-0x000000000017C000-memory.dmp

          Filesize

          304KB

        • memory/1188-73-0x0000000000130000-0x000000000017C000-memory.dmp

          Filesize

          304KB

        • memory/1216-78-0x00000000029C0000-0x0000000002A0C000-memory.dmp

          Filesize

          304KB

        • memory/1216-79-0x00000000029C0000-0x0000000002A0C000-memory.dmp

          Filesize

          304KB

        • memory/1216-77-0x00000000029C0000-0x0000000002A0C000-memory.dmp

          Filesize

          304KB

        • memory/1216-76-0x00000000029C0000-0x0000000002A0C000-memory.dmp

          Filesize

          304KB

        • memory/1272-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-109-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1272-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-104-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-103-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-102-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1272-97-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1272-96-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1272-95-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1272-93-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1724-111-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1724-110-0x0000000000280000-0x00000000002CC000-memory.dmp

          Filesize

          304KB

        • memory/1972-85-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/1972-87-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1972-100-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1972-99-0x0000000000320000-0x000000000036C000-memory.dmp

          Filesize

          304KB

        • memory/1972-86-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1972-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1972-84-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/1972-54-0x00000000751A1000-0x00000000751A3000-memory.dmp

          Filesize

          8KB

        • memory/1972-83-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/1972-82-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/1972-56-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1972-55-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1972-88-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1972-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB