Analysis

  • max time kernel
    205s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 06:51

General

  • Target

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7.exe

  • Size

    245KB

  • MD5

    25a3dd3675153038e7ffdf979e5a8690

  • SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

  • SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

  • SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • SSDEEP

    3072:Ko9jAKWsuSKw+XUxcKuUjxMAULmqVpQ5+mz8p3KIfSTT5rTJq6Gl:shsyoxBuUfMAZZv5rlqHl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7.exe
    "C:\Users\Admin\AppData\Local\Temp\07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7.exe
      "C:\Users\Admin\AppData\Local\Temp\07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:340
      • C:\WINDÎWS\åõðlîrår.exe
        C:\WINDÎWS\åõðlîrår.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\WINDÎWS\åõðlîrår.exe
          C:\WINDÎWS\åõðlîrår.exe
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM explorer.exe
            5⤵
            • Kills process with taskkill
            PID:816
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1440
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:1508
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    PID:1964
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDÎWS\åõðlîrår.exe

    Filesize

    245KB

    MD5

    25a3dd3675153038e7ffdf979e5a8690

    SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

    SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

    SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • C:\WINDÎWS\åõðlîrår.exe

    Filesize

    245KB

    MD5

    25a3dd3675153038e7ffdf979e5a8690

    SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

    SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

    SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • C:\WINDÎWS\åõðlîrår.exe

    Filesize

    245KB

    MD5

    25a3dd3675153038e7ffdf979e5a8690

    SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

    SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

    SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • \WINDÎWS\åõðlîrår.exe

    Filesize

    245KB

    MD5

    25a3dd3675153038e7ffdf979e5a8690

    SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

    SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

    SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • \WINDÎWS\åõðlîrår.exe

    Filesize

    245KB

    MD5

    25a3dd3675153038e7ffdf979e5a8690

    SHA1

    11b381516e1362bfa72ae6a345c75103cdb5f39a

    SHA256

    07e47eb5b34b64aa4a00df26cd2b919843b96c0d0b13246ad8ac9148685c6db7

    SHA512

    5694d09df07445b570cae3b4ab9dc92f0910467621beaa75c899f5f506702b32b058912c05ab3a4bcc6c37f0a52f95c9048a40a9b332cae1b912428d3c61572d

  • memory/340-63-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-55-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-66-0x000000000041976C-mapping.dmp

  • memory/340-65-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-67-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-68-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-69-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-54-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-57-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-78-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-61-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-58-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/340-60-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/816-97-0x0000000000000000-mapping.dmp

  • memory/1280-92-0x000000000041976C-mapping.dmp

  • memory/1280-96-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1280-98-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1440-70-0x000007FEFB9F1000-0x000007FEFB9F3000-memory.dmp

    Filesize

    8KB

  • memory/1508-71-0x000007FEFB8F1000-0x000007FEFB8F3000-memory.dmp

    Filesize

    8KB

  • memory/1868-76-0x0000000000000000-mapping.dmp

  • memory/1964-72-0x000007FEFB311000-0x000007FEFB313000-memory.dmp

    Filesize

    8KB