Analysis

  • max time kernel
    179s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 06:49

General

  • Target

    aef9bbf6f0baf24800c6b7f1fa710c3f67b712861ea38cf6e52680f4a1168882.exe

  • Size

    507KB

  • MD5

    331b5bdbe365ba9ff5a3f668842e6b50

  • SHA1

    17cf27f0a78dd0d9430070c5e1d2048684ae0de5

  • SHA256

    aef9bbf6f0baf24800c6b7f1fa710c3f67b712861ea38cf6e52680f4a1168882

  • SHA512

    12c162e0d59745ec72a70fd563d984fcc6b4fccf7c112fe32e43cff337f8efabba1156ff27bd200419d52820c4ea1c66c2868e735a9faec05e931860627986ca

  • SSDEEP

    12288:ofTI1SQrLRQ8Hs2UyZWgdRkdMczFxhtfnygx7j1FLhfc:oLEHRht9RkdMc5Dtfnygx7Zc

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef9bbf6f0baf24800c6b7f1fa710c3f67b712861ea38cf6e52680f4a1168882.exe
    "C:\Users\Admin\AppData\Local\Temp\aef9bbf6f0baf24800c6b7f1fa710c3f67b712861ea38cf6e52680f4a1168882.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fhkftja7.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES877A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8779.tmp"
        3⤵
          PID:1712
      • C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe
        C:\Users\Admin\AppData\Local\Temp\\AppLaunch\Service.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1148
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:968
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\local.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\local.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1356
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:544
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1352

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe

            Filesize

            1.1MB

            MD5

            34aa912defa18c2c129f1e09d75c1d7e

            SHA1

            9c3046324657505a30ecd9b1fdb46c05bde7d470

            SHA256

            6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

            SHA512

            d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

          • C:\Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe

            Filesize

            1.1MB

            MD5

            34aa912defa18c2c129f1e09d75c1d7e

            SHA1

            9c3046324657505a30ecd9b1fdb46c05bde7d470

            SHA256

            6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

            SHA512

            d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

          • C:\Users\Admin\AppData\Local\Temp\RES877A.tmp

            Filesize

            1KB

            MD5

            2015b3ee905d7ae4f3f319e203651531

            SHA1

            4f71bc5ac8f86d192b6adaaac13ebb6bf15966ab

            SHA256

            ad79f7a414b06e36cd3a475d340d7b2ae5e865c375ea4b998eebc3154d04a259

            SHA512

            b63e93834d14bcb8a2ec8f2733f79c401728d0c3413c4462ac65e4282f80d6fc123f5e7c4decd846ee1d5a6575706bd64c2b48154029bce024b2b6705600c008

          • C:\Users\Admin\AppData\Local\Temp\fhkftja7.0.vb

            Filesize

            1KB

            MD5

            a3b0d1ffeaf1201274f05d4787ee19e6

            SHA1

            2336eff86d49e6b0db6e4bba99dae15586393957

            SHA256

            2e8b7acfc55edf7b9df1c9232d3e729ac23c95f849e775112c15cc05bce022f8

            SHA512

            357bb02287bf235ecd456fbeb705cb9eab271aede0c52c0475f9afdcde1e21a39a21b5a3a5597af0639a236b4be1ffdaa6dbe399de16cadaf9b276e5a2a64943

          • C:\Users\Admin\AppData\Local\Temp\fhkftja7.cmdline

            Filesize

            168B

            MD5

            2f33fbe824fc6bdaba7ce55fbc21818d

            SHA1

            da12793805e7b2291ef26c80b6ab8b904caa136e

            SHA256

            c7ba47d7fce70ee6a7b813f9165ae04691c70614b8e9d7fd1ad748b55c2716f1

            SHA512

            a87dcb2bf64dc18134e6538b221244aec580188bac1b695e1c5d6f926eb614823b1a1986b9c36a7096684cccb4a826a82f5a4486a68a17cc0cacdf6cb59e9192

          • C:\Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • C:\Users\Admin\AppData\Local\Temp\vbc8779.tmp

            Filesize

            652B

            MD5

            63c46f343f3c2696f310e775b7df18d4

            SHA1

            6b2cd4db24613d0876b833a80322de0f86eec2a3

            SHA256

            54c6e57acb1594b9fa1612dc0b4efd25983fa3c60fe2e403618526ac8647103c

            SHA512

            2a585d8a31b4030ddee897aa9f54fb8bd4ad5a366ff060a78f26acc50b6f908946a91d80fca37571cf1a81981e2dd4f5929707445202eb437175c3f8ca2534b6

          • \Users\Admin\AppData\Local\Temp\AppLaunch\Service.exe

            Filesize

            1.1MB

            MD5

            34aa912defa18c2c129f1e09d75c1d7e

            SHA1

            9c3046324657505a30ecd9b1fdb46c05bde7d470

            SHA256

            6df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386

            SHA512

            d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98

          • \Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • \Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • \Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • \Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • \Users\Admin\AppData\Local\Temp\fhkftja7.dll

            Filesize

            7KB

            MD5

            a614dee69c1b730bb8454b348b940edd

            SHA1

            c63010da55efe277476793d4f155e8e3c74ac755

            SHA256

            c1651ad5e5977a59b35718e5ed3bd2a3ca5466abf3c6366b5bfcf7b7f2be55fb

            SHA512

            23bc364ef73a009593abf2126aff19b6184b965f49f3c3cd2e26be37ee76b74fb4adbcb8603ec1d7f41453724dcda3b6546ec2ab0458ab2caee8a5838dded8c0

          • memory/1372-75-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1372-82-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1372-74-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1372-72-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1372-71-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1372-93-0x0000000000400000-0x000000000047A000-memory.dmp

            Filesize

            488KB

          • memory/1476-79-0x0000000001F25000-0x0000000001F36000-memory.dmp

            Filesize

            68KB

          • memory/1476-55-0x00000000749F0000-0x0000000074F9B000-memory.dmp

            Filesize

            5.7MB

          • memory/1476-56-0x0000000001F25000-0x0000000001F36000-memory.dmp

            Filesize

            68KB

          • memory/1476-69-0x00000000749F0000-0x0000000074F9B000-memory.dmp

            Filesize

            5.7MB

          • memory/1476-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

            Filesize

            8KB