Analysis

  • max time kernel
    180s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 00:52

General

  • Target

    90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1.exe

  • Size

    209KB

  • MD5

    c0d62caa0437de0a41c61e5584a29594

  • SHA1

    200037c27215b5d9c7cb994bc96192da3e1d1e3d

  • SHA256

    90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1

  • SHA512

    f8ffd8932e22c07a05decfcf59e4d654f82d12ad0b6d65d7b032ff924785a0d654b67257c060e15bb59a0f19d9ff60bd605ad9d66d1026fbf96c0accfbbc36f3

  • SSDEEP

    6144:X4Csg/wAcsP4YeUPeYOwToSAw3HgNzx5Nod38:ovdAFChSATV5N+M

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2528
    • C:\Windows\system32\taskhostw.exe
      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
      1⤵
        PID:2808
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
        1⤵
          PID:3104
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3464
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:2844
            • C:\Windows\system32\backgroundTaskHost.exe
              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
              1⤵
                PID:5028
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:4788
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3864
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:3560
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3392
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                        1⤵
                          PID:3296
                        • C:\Windows\Explorer.EXE
                          C:\Windows\Explorer.EXE
                          1⤵
                            PID:1068
                            • C:\Users\Admin\AppData\Local\Temp\90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1.exe
                              "C:\Users\Admin\AppData\Local\Temp\90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1.exe"
                              2⤵
                              • Suspicious use of SetThreadContext
                              • Suspicious use of WriteProcessMemory
                              PID:4516
                              • C:\Users\Admin\AppData\Local\Temp\90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1.exe
                                C:\Users\Admin\AppData\Local\Temp\90d8055f8858c99a1c735436d42bbe1ff54363c9428b927c2eb7edbba45cf6c1.exe
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4160
                                • C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe
                                  "C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious use of WriteProcessMemory
                                  PID:4032
                                  • C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe
                                    C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of WriteProcessMemory
                                    PID:4140
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb8374bc2.bat"
                                  4⤵
                                    PID:3616
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                              1⤵
                                PID:2580
                              • C:\Windows\system32\BackgroundTransferHost.exe
                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                1⤵
                                  PID:4300
                                • C:\Windows\system32\backgroundTaskHost.exe
                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                  1⤵
                                    PID:2620
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:1172
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      1⤵
                                        PID:4428

                                      Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\tmpb8374bc2.bat

                                              Filesize

                                              307B

                                              MD5

                                              85bf258f854d61d551749beeb8d0c3cc

                                              SHA1

                                              0cdb3a11861a8b39653a3503681d6eaddcfedc8c

                                              SHA256

                                              a7408c55736c6c3c68777e6349416c4783f96f2f3a9301e1166521324d97cb9e

                                              SHA512

                                              a510244a229880426f65bb55edb2c3477a9e1972e67ef639561679560c0671933d1f9739453dec7c1759db024d5c614cff0e63764946e395a8b21a94d0ef2394

                                            • C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe

                                              Filesize

                                              209KB

                                              MD5

                                              c206175fb6dc67318a02294b0fdba143

                                              SHA1

                                              bb04325f4b1cf3364645011983ece6fce10b2849

                                              SHA256

                                              161681c17a808ad1696a75963e4a4b3eedf09e8e08a396fe98188223f3b52297

                                              SHA512

                                              dc9e95468f0c671b97faf7b8f5d7778fcb640a19bfd69422383dcd59a9687f6edb120d81bbbde6d15b0ffd90fcabc61fa205ffb6abc1db213a85f15c5b796758

                                            • C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe

                                              Filesize

                                              209KB

                                              MD5

                                              c206175fb6dc67318a02294b0fdba143

                                              SHA1

                                              bb04325f4b1cf3364645011983ece6fce10b2849

                                              SHA256

                                              161681c17a808ad1696a75963e4a4b3eedf09e8e08a396fe98188223f3b52297

                                              SHA512

                                              dc9e95468f0c671b97faf7b8f5d7778fcb640a19bfd69422383dcd59a9687f6edb120d81bbbde6d15b0ffd90fcabc61fa205ffb6abc1db213a85f15c5b796758

                                            • C:\Users\Admin\AppData\Roaming\Oqqy\ilpun.exe

                                              Filesize

                                              209KB

                                              MD5

                                              c206175fb6dc67318a02294b0fdba143

                                              SHA1

                                              bb04325f4b1cf3364645011983ece6fce10b2849

                                              SHA256

                                              161681c17a808ad1696a75963e4a4b3eedf09e8e08a396fe98188223f3b52297

                                              SHA512

                                              dc9e95468f0c671b97faf7b8f5d7778fcb640a19bfd69422383dcd59a9687f6edb120d81bbbde6d15b0ffd90fcabc61fa205ffb6abc1db213a85f15c5b796758

                                            • memory/4140-144-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/4160-136-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/4160-135-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/4160-146-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB

                                            • memory/4160-133-0x0000000000400000-0x000000000043B000-memory.dmp

                                              Filesize

                                              236KB