Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe
Resource
win10v2004-20220812-en
General
-
Target
b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe
-
Size
339KB
-
MD5
725d3e723e72fb9156cf4a525ed14b4b
-
SHA1
40e197f6086c67ba8c9890d11d88f51eee7b11b2
-
SHA256
b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798
-
SHA512
4dcfea8d4f17b30ef7367fd5d31dfba087aba43c0f4d90909840f4b2810b8acdbc5de702395e8abd76b5c8d90179a8a03343dc140b47d3568b7b04276f906ca3
-
SSDEEP
6144:AA76KljCh2Hb2baqDqhmmvClvdwpjc3K8CtY:/CQ72+MrmRaK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1832 alocru.exe -
Deletes itself 1 IoCs
pid Process 272 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{7BD94DA8-4FEF-AD4D-5225-887A4931AB67} = "C:\\Users\\Admin\\AppData\\Roaming\\Eqzyqu\\alocru.exe" alocru.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run alocru.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1044 set thread context of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe 1832 alocru.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 1832 alocru.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1044 wrote to memory of 1832 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 27 PID 1832 wrote to memory of 1112 1832 alocru.exe 14 PID 1832 wrote to memory of 1112 1832 alocru.exe 14 PID 1832 wrote to memory of 1112 1832 alocru.exe 14 PID 1832 wrote to memory of 1112 1832 alocru.exe 14 PID 1832 wrote to memory of 1112 1832 alocru.exe 14 PID 1832 wrote to memory of 1172 1832 alocru.exe 13 PID 1832 wrote to memory of 1172 1832 alocru.exe 13 PID 1832 wrote to memory of 1172 1832 alocru.exe 13 PID 1832 wrote to memory of 1172 1832 alocru.exe 13 PID 1832 wrote to memory of 1172 1832 alocru.exe 13 PID 1832 wrote to memory of 1212 1832 alocru.exe 11 PID 1832 wrote to memory of 1212 1832 alocru.exe 11 PID 1832 wrote to memory of 1212 1832 alocru.exe 11 PID 1832 wrote to memory of 1212 1832 alocru.exe 11 PID 1832 wrote to memory of 1212 1832 alocru.exe 11 PID 1832 wrote to memory of 1044 1832 alocru.exe 12 PID 1832 wrote to memory of 1044 1832 alocru.exe 12 PID 1832 wrote to memory of 1044 1832 alocru.exe 12 PID 1832 wrote to memory of 1044 1832 alocru.exe 12 PID 1832 wrote to memory of 1044 1832 alocru.exe 12 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28 PID 1044 wrote to memory of 272 1044 b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe"C:\Users\Admin\AppData\Local\Temp\b4dd82a41cea1491b88a7b7360061745e4d5514fb0ab1da48f76d5d36a8f0798.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Eqzyqu\alocru.exe"C:\Users\Admin\AppData\Roaming\Eqzyqu\alocru.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe34bec79.bat"3⤵
- Deletes itself
PID:272
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5ddeff8b7d6226713bf72b415a5ac1930
SHA10d593eadbd4c6b3e50633d8efe2d41ba9f73b837
SHA2565129e5a36b1787ac00029a13aac6e0bfce0efd98d8ef33d2069b3daaf00ea24c
SHA51264c94291ce7ba6691876dcfe9a91fb4c1ff624586a2c41667dc2a52ef4cd71dd3b9847f8048823615de31eca992fb90a9cd55726c1fae5a4babf5aab9ab52232
-
Filesize
339KB
MD5482221ff598c35ac52ffbf4924ee71a9
SHA162c226ce6e0d6b606e186e6300bfc6547cedde3a
SHA2567ccd22ab7709d85126a0c3bb023bcc7056eaaad450633671ec2821878792e784
SHA512208dbfdbbab4dc877ac6ea1a822a87cd2d31b6d576dead3f7c60eb54b91d4a1bdfc43f6de5aaaeb796a62d62f5b6a0fe1721afdeaa2c935a645d8157ff70198b
-
Filesize
339KB
MD5482221ff598c35ac52ffbf4924ee71a9
SHA162c226ce6e0d6b606e186e6300bfc6547cedde3a
SHA2567ccd22ab7709d85126a0c3bb023bcc7056eaaad450633671ec2821878792e784
SHA512208dbfdbbab4dc877ac6ea1a822a87cd2d31b6d576dead3f7c60eb54b91d4a1bdfc43f6de5aaaeb796a62d62f5b6a0fe1721afdeaa2c935a645d8157ff70198b
-
Filesize
339KB
MD5482221ff598c35ac52ffbf4924ee71a9
SHA162c226ce6e0d6b606e186e6300bfc6547cedde3a
SHA2567ccd22ab7709d85126a0c3bb023bcc7056eaaad450633671ec2821878792e784
SHA512208dbfdbbab4dc877ac6ea1a822a87cd2d31b6d576dead3f7c60eb54b91d4a1bdfc43f6de5aaaeb796a62d62f5b6a0fe1721afdeaa2c935a645d8157ff70198b