Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 22:14

General

  • Target

    81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe

  • Size

    241KB

  • MD5

    c7c1ed4cc182307b76b3bc01253cdd06

  • SHA1

    b5fda2a62e340b5e4e4ba509316c844ab885b35d

  • SHA256

    81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0

  • SHA512

    7d114b688c5f11d9f33951374dd10fb3eaa5fa826c3aaa042f6ff78daf9b7c02cbd2096b891cffa0fe0e6a17a7881d282c6da1caaf62e3790589fb5978844352

  • SSDEEP

    3072:HDgnEdPvIvxywNCQoVeEeZaL8QwtVg6C7619nc7BSQP47n/E5pNFZHO2e0QKlPu9:scA1Cdfe4oQwtVi+TWYQQ7n/gpNTdGL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
        "C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
          C:\Users\Admin\AppData\Local\Temp\81eb7a1a8f2e4a01246852cab421df53e693c8c0e78612f731cb16fad210b3b0.exe
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe
            "C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:572
            • C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe
              C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:524
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp43a7bb14.bat"
            4⤵
            • Deletes itself
            PID:1228
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1336
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1236
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1984
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:2000
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:840
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1732
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1160
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:584

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmp43a7bb14.bat

                      Filesize

                      307B

                      MD5

                      dddf08b4068b689af8ad1824f5c7e305

                      SHA1

                      7bd32d85a90c527741f8c51ef37e0521a56f9862

                      SHA256

                      88800a76e3970ab91f6495f8c511b3e84474c5cc6851c1b0a57e4f7562cbb310

                      SHA512

                      546f115f486c0ca8c8bf327fb48ea83523a2c72711090e393eab5f467746fe4fec1e31b2aba277fb62e1b29e95f73a12a2313c152e09def04b80ecdada1a0d57

                    • C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe

                      Filesize

                      241KB

                      MD5

                      30e6891570dd52fab6158315b70a2ae4

                      SHA1

                      2ab24c10cf5019d5c788f48fa1e1ae1d987f3f11

                      SHA256

                      fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0

                      SHA512

                      729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc

                    • C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe

                      Filesize

                      241KB

                      MD5

                      30e6891570dd52fab6158315b70a2ae4

                      SHA1

                      2ab24c10cf5019d5c788f48fa1e1ae1d987f3f11

                      SHA256

                      fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0

                      SHA512

                      729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc

                    • C:\Users\Admin\AppData\Roaming\Sali\okvyt.exe

                      Filesize

                      241KB

                      MD5

                      30e6891570dd52fab6158315b70a2ae4

                      SHA1

                      2ab24c10cf5019d5c788f48fa1e1ae1d987f3f11

                      SHA256

                      fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0

                      SHA512

                      729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc

                    • \Users\Admin\AppData\Roaming\Sali\okvyt.exe

                      Filesize

                      241KB

                      MD5

                      30e6891570dd52fab6158315b70a2ae4

                      SHA1

                      2ab24c10cf5019d5c788f48fa1e1ae1d987f3f11

                      SHA256

                      fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0

                      SHA512

                      729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc

                    • \Users\Admin\AppData\Roaming\Sali\okvyt.exe

                      Filesize

                      241KB

                      MD5

                      30e6891570dd52fab6158315b70a2ae4

                      SHA1

                      2ab24c10cf5019d5c788f48fa1e1ae1d987f3f11

                      SHA256

                      fa1345fe87d3861d59b597c8fde53434cbf2745862cfe4ca88a4c64bcfbe8ad0

                      SHA512

                      729a63bb538d6c4f4f633cd419dd33746edace67edd286b50fcb84b3ebf6e1946f901349760f669d3e42e86b0fddae51ef26b8334bbca42142a7d24262b63efc

                    • memory/524-117-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/524-99-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/840-123-0x00000000005D0000-0x000000000060B000-memory.dmp

                      Filesize

                      236KB

                    • memory/840-122-0x00000000005D0000-0x000000000060B000-memory.dmp

                      Filesize

                      236KB

                    • memory/840-121-0x00000000005D0000-0x000000000060B000-memory.dmp

                      Filesize

                      236KB

                    • memory/840-120-0x00000000005D0000-0x000000000060B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-86-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-65-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-61-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-59-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-58-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-56-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/988-55-0x0000000000400000-0x000000000043B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1236-87-0x0000000000410000-0x000000000044B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1236-88-0x0000000000410000-0x000000000044B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1236-89-0x0000000000410000-0x000000000044B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1236-90-0x0000000000410000-0x000000000044B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1336-96-0x00000000002B0000-0x00000000002EB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1336-97-0x00000000002B0000-0x00000000002EB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1336-95-0x00000000002B0000-0x00000000002EB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1336-94-0x00000000002B0000-0x00000000002EB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1388-103-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1388-104-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1388-102-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1388-101-0x0000000002A70000-0x0000000002AAB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1732-129-0x0000000000230000-0x000000000026B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1732-128-0x0000000000230000-0x000000000026B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1732-127-0x0000000000230000-0x000000000026B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1732-126-0x0000000000230000-0x000000000026B000-memory.dmp

                      Filesize

                      236KB

                    • memory/1768-54-0x0000000076961000-0x0000000076963000-memory.dmp

                      Filesize

                      8KB

                    • memory/1984-109-0x0000000003B90000-0x0000000003BCB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1984-110-0x0000000003B90000-0x0000000003BCB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1984-108-0x0000000003B90000-0x0000000003BCB000-memory.dmp

                      Filesize

                      236KB

                    • memory/1984-107-0x0000000003B90000-0x0000000003BCB000-memory.dmp

                      Filesize

                      236KB

                    • memory/2000-116-0x0000000000500000-0x000000000053B000-memory.dmp

                      Filesize

                      236KB

                    • memory/2000-115-0x0000000000500000-0x000000000053B000-memory.dmp

                      Filesize

                      236KB

                    • memory/2000-114-0x0000000000500000-0x000000000053B000-memory.dmp

                      Filesize

                      236KB

                    • memory/2000-113-0x0000000000500000-0x000000000053B000-memory.dmp

                      Filesize

                      236KB