Analysis

  • max time kernel
    143s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 09:12

General

  • Target

    878aa8aabf7e7ea6f4c3d2d0bb69648a3ef7b5e099b341738d3508bb5d4720be.exe

  • Size

    177KB

  • MD5

    556d1357b8df064b158c9fa260f99ec0

  • SHA1

    62bda45c4a5dc4d4c945d0da013a18a021144ad6

  • SHA256

    878aa8aabf7e7ea6f4c3d2d0bb69648a3ef7b5e099b341738d3508bb5d4720be

  • SHA512

    b0545ab669747038a06a7fc3623d21f525bd568d9fffb9aab09958717490d595fe2f06e948bcc7ecd253a82e60fa414c9e6a29e122bdaa9ebf8c838cd0844c68

  • SSDEEP

    3072:1QgqpKOv1XcbN54ILz2JRYiR8rf8zKPo9QKUaTAz2RXgTac9DN0KrwkC8:1QgqEOvtcbD4Kz2JR52fAKynAz2RaTD6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:464
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\878aa8aabf7e7ea6f4c3d2d0bb69648a3ef7b5e099b341738d3508bb5d4720be.exe
      "C:\Users\Admin\AppData\Local\Temp\878aa8aabf7e7ea6f4c3d2d0bb69648a3ef7b5e099b341738d3508bb5d4720be.exe"
      2⤵
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:304
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-18\$bb8ab67ad8382496fd4eead6952e3208\@

    Filesize

    2KB

    MD5

    c47b082b7205b9b91ab49326f2eb5d40

    SHA1

    133df031ef99807f1b22d4b5430f5d6adbad59a5

    SHA256

    756aa043e1ed229130b11efa9434ca0df953f1ba29f74b3e4f2773ac29cf7870

    SHA512

    54a7f402ad341449020b65858e9987d3b58468b361915ed636687c087f674a7c7bfa5f80d73d76075fdf3c4838c8a8dce8e4f487a87c948e9ca9fb9f16031fa7

  • C:\$Recycle.Bin\S-1-5-18\$bb8ab67ad8382496fd4eead6952e3208\n

    Filesize

    41KB

    MD5

    fb4e3236959152a057bc6b7603c538ef

    SHA1

    b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

    SHA256

    8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

    SHA512

    993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

  • C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\$bb8ab67ad8382496fd4eead6952e3208\n

    Filesize

    41KB

    MD5

    fb4e3236959152a057bc6b7603c538ef

    SHA1

    b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

    SHA256

    8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

    SHA512

    993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

  • \$Recycle.Bin\S-1-5-18\$bb8ab67ad8382496fd4eead6952e3208\n

    Filesize

    41KB

    MD5

    fb4e3236959152a057bc6b7603c538ef

    SHA1

    b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

    SHA256

    8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

    SHA512

    993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

  • \$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\$bb8ab67ad8382496fd4eead6952e3208\n

    Filesize

    41KB

    MD5

    fb4e3236959152a057bc6b7603c538ef

    SHA1

    b25a70c07dd2eb1c9fdf89f7a2ffc286f226edf4

    SHA256

    8244ddfcba327a3f67a5582642c53241ee5e58d75808547cd74808bcded272d0

    SHA512

    993dbfbf71394ad1f120a8687d57eac2b9a55b11b1594aadd5a8d90edc0a26e5fd21f78317d342837ce27728613b5fc9c6ea40f86d17e5c477071be84f8aa3d2

  • memory/304-54-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/304-57-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/304-58-0x0000000000230000-0x0000000000261000-memory.dmp

    Filesize

    196KB

  • memory/304-63-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1976-62-0x0000000000000000-mapping.dmp