Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 05:48

General

  • Target

    1b25469cad4428c8f63b54b92bfa80d963c75791cac5f5868f84683fd4c71394.exe

  • Size

    2.0MB

  • MD5

    620b8a4e8aa8b1680cca1bde8b9533e3

  • SHA1

    39ba5c0fd5605688bf9d7cc043173616b5bcfebf

  • SHA256

    1b25469cad4428c8f63b54b92bfa80d963c75791cac5f5868f84683fd4c71394

  • SHA512

    2095682487b2ab2ea97c38c11d9c07113badd8991ef8c3505c0bd975742b2ec53f384698c6ec53d24ea5239feb6c3b3e8703c2241186287cdf4cc1a07fd8a73c

  • SSDEEP

    49152:grhVOJDvuZuVhqr5Xt0E2OV+QQpHEwFV8zaPGhHj/qhj:gdVONvuN5XmE2OVDQpHEEV8GPwDa

Score
8/10

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b25469cad4428c8f63b54b92bfa80d963c75791cac5f5868f84683fd4c71394.exe
    "C:\Users\Admin\AppData\Local\Temp\1b25469cad4428c8f63b54b92bfa80d963c75791cac5f5868f84683fd4c71394.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\BT.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • \Windows\SysWOW64\BT.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • \Windows\SysWOW64\BT.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • \Windows\SysWOW64\BT.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • \Windows\SysWOW64\BT.ime

    Filesize

    52KB

    MD5

    b60da4e2e5aceba3ce3d87ee2cd872ee

    SHA1

    9bbdbf1f3ce2c000a86e0473da756a4b1031db41

    SHA256

    b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453

    SHA512

    664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874

  • memory/2016-94-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-88-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-68-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-70-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-74-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-72-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-76-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-80-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-90-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-100-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-102-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-98-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-96-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-54-0x0000000075A71000-0x0000000075A73000-memory.dmp

    Filesize

    8KB

  • memory/2016-92-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-61-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-86-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-84-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-82-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-78-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-66-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-103-0x0000000000400000-0x0000000000867000-memory.dmp

    Filesize

    4.4MB

  • memory/2016-64-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-104-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-62-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-59-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-60-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-57-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2016-55-0x0000000000400000-0x0000000000867000-memory.dmp

    Filesize

    4.4MB

  • memory/2016-110-0x0000000003570000-0x000000000357E000-memory.dmp

    Filesize

    56KB

  • memory/2016-112-0x0000000000400000-0x0000000000867000-memory.dmp

    Filesize

    4.4MB

  • memory/2016-113-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB