Analysis

  • max time kernel
    48s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 00:51

General

  • Target

    1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e.exe

  • Size

    210KB

  • MD5

    7afbe46a444a31753ac45f0020cb6335

  • SHA1

    427f046b0197e7ac990f2d7c3056b8db92c73d27

  • SHA256

    1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e

  • SHA512

    19ee7f3660f52332c60ad9e6c80c9935e83506fb988fd53e0da5ac72b161a9606779df08ddafa8cc95dcc5d4a237baf32d707b7b46d77d155408f31c039ee2fb

  • SSDEEP

    6144:gWCt2ISzpluSkpZDReepBq9gdJtGZXzQd:gWQSgpZVe4Ig1G8d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e.exe
        "C:\Users\Admin\AppData\Local\Temp\1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1672
        • \??\c:\users\admin\appdata\local\temp\1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e.exe
          "c:\users\admin\appdata\local\temp\1471021c3fc0bc818d25b2b591f223a6f97db19ecb3ad5bb62e8a70bd7ae737e.exe"
          3⤵
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1580
          • C:\Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe
            "C:\Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1804
            • \??\c:\users\admin\appdata\roaming\ulgoik\ecmoi.exe
              "c:\users\admin\appdata\roaming\ulgoik\ecmoi.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1912
              • C:\Program Files (x86)\internet explorer\iexplore.exe
                iexplore.exe -k "about:blank"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1460
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -k "about:blank"
                  7⤵
                    PID:1272
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2d3f2520.bat"
              4⤵
              • Deletes itself
              PID:332
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1224
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1132
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1744
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "-645621703-1039150873-1107256381-523343123-972888906-12879458801783073673877305545"
              1⤵
                PID:828
              • C:\Windows\system32\LogonUI.exe
                "LogonUI.exe" /flags:0x0
                1⤵
                  PID:1932
                • C:\Windows\system32\csrss.exe
                  %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                  1⤵
                  • Enumerates system info in registry
                  PID:1788
                • C:\Windows\system32\winlogon.exe
                  winlogon.exe
                  1⤵
                  • Modifies data under HKEY_USERS
                  PID:1096
                  • C:\Windows\system32\LogonUI.exe
                    "LogonUI.exe" /flags:0x0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1768

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmp2d3f2520.bat

                  Filesize

                  307B

                  MD5

                  f0874cbad495fc49b2fa0d10b49b0a55

                  SHA1

                  d5d05e4eeb6594e9c03738a071e8311b636e84c1

                  SHA256

                  52d1366c36d1888d639b3caba6f76b5511a8b0e16c263cd55c7fb6c5b653abbb

                  SHA512

                  8e5872d23f150a624cb95572f72961a98a1cab0d012ec1f400a8d42cabe052e35ea2e8a829e733e862c4fdfa74b7a0d8f930523604bf0bd24299fc10522b0029

                • C:\Users\Admin\AppData\Roaming\Niqyer\emeh.eli

                  Filesize

                  398B

                  MD5

                  5b7680e8ca8d45def079d49e4d6a6345

                  SHA1

                  79f2767d086904f33a70fd63403a705ce9ad066d

                  SHA256

                  95f6a31b6dacfceda99c006ff9e72c7a060885e46507495ce2cc114c911a5bec

                  SHA512

                  71997a0fdf4ace4c6ecce747948d60484706f70e5997efc2dba932083f14c6f5aefa98266e5351afd85a321353540612f165d56884e2cb1256c34f44c04fd403

                • C:\Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe

                  Filesize

                  210KB

                  MD5

                  47a8fb72437f7ddab6a4b01c2a828fe1

                  SHA1

                  c8aec68352b5b7e85fc282374c88ce67115b9bb9

                  SHA256

                  5baca74d28a6e41e397b90cce6df520a7c44bfef78985ed06481e9bf39e7cbe0

                  SHA512

                  4e8bc60fb0728522c18420b3da2e03407fc24ad3786bbf2264ecf76a2113a03645f0aa3ddb75c17551a10828e69a58bdfc736ce3133f47fd89c5a34d74282d23

                • C:\Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe

                  Filesize

                  210KB

                  MD5

                  47a8fb72437f7ddab6a4b01c2a828fe1

                  SHA1

                  c8aec68352b5b7e85fc282374c88ce67115b9bb9

                  SHA256

                  5baca74d28a6e41e397b90cce6df520a7c44bfef78985ed06481e9bf39e7cbe0

                  SHA512

                  4e8bc60fb0728522c18420b3da2e03407fc24ad3786bbf2264ecf76a2113a03645f0aa3ddb75c17551a10828e69a58bdfc736ce3133f47fd89c5a34d74282d23

                • \??\c:\users\admin\appdata\roaming\ulgoik\ecmoi.exe

                  Filesize

                  210KB

                  MD5

                  47a8fb72437f7ddab6a4b01c2a828fe1

                  SHA1

                  c8aec68352b5b7e85fc282374c88ce67115b9bb9

                  SHA256

                  5baca74d28a6e41e397b90cce6df520a7c44bfef78985ed06481e9bf39e7cbe0

                  SHA512

                  4e8bc60fb0728522c18420b3da2e03407fc24ad3786bbf2264ecf76a2113a03645f0aa3ddb75c17551a10828e69a58bdfc736ce3133f47fd89c5a34d74282d23

                • \Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe

                  Filesize

                  210KB

                  MD5

                  47a8fb72437f7ddab6a4b01c2a828fe1

                  SHA1

                  c8aec68352b5b7e85fc282374c88ce67115b9bb9

                  SHA256

                  5baca74d28a6e41e397b90cce6df520a7c44bfef78985ed06481e9bf39e7cbe0

                  SHA512

                  4e8bc60fb0728522c18420b3da2e03407fc24ad3786bbf2264ecf76a2113a03645f0aa3ddb75c17551a10828e69a58bdfc736ce3133f47fd89c5a34d74282d23

                • \Users\Admin\AppData\Roaming\Ulgoik\ecmoi.exe

                  Filesize

                  210KB

                  MD5

                  47a8fb72437f7ddab6a4b01c2a828fe1

                  SHA1

                  c8aec68352b5b7e85fc282374c88ce67115b9bb9

                  SHA256

                  5baca74d28a6e41e397b90cce6df520a7c44bfef78985ed06481e9bf39e7cbe0

                  SHA512

                  4e8bc60fb0728522c18420b3da2e03407fc24ad3786bbf2264ecf76a2113a03645f0aa3ddb75c17551a10828e69a58bdfc736ce3133f47fd89c5a34d74282d23

                • memory/332-123-0x0000000000210000-0x0000000000239000-memory.dmp

                  Filesize

                  164KB

                • memory/332-111-0x0000000000000000-mapping.dmp

                • memory/332-121-0x0000000000210000-0x0000000000239000-memory.dmp

                  Filesize

                  164KB

                • memory/332-122-0x0000000000210000-0x0000000000239000-memory.dmp

                  Filesize

                  164KB

                • memory/332-124-0x0000000000210000-0x0000000000239000-memory.dmp

                  Filesize

                  164KB

                • memory/1132-90-0x0000000000330000-0x0000000000359000-memory.dmp

                  Filesize

                  164KB

                • memory/1132-89-0x0000000000330000-0x0000000000359000-memory.dmp

                  Filesize

                  164KB

                • memory/1132-88-0x0000000000330000-0x0000000000359000-memory.dmp

                  Filesize

                  164KB

                • memory/1132-87-0x0000000000330000-0x0000000000359000-memory.dmp

                  Filesize

                  164KB

                • memory/1224-96-0x0000000001C40000-0x0000000001C69000-memory.dmp

                  Filesize

                  164KB

                • memory/1224-94-0x0000000001C40000-0x0000000001C69000-memory.dmp

                  Filesize

                  164KB

                • memory/1224-95-0x0000000001C40000-0x0000000001C69000-memory.dmp

                  Filesize

                  164KB

                • memory/1224-93-0x0000000001C40000-0x0000000001C69000-memory.dmp

                  Filesize

                  164KB

                • memory/1260-99-0x00000000029E0000-0x0000000002A09000-memory.dmp

                  Filesize

                  164KB

                • memory/1260-100-0x00000000029E0000-0x0000000002A09000-memory.dmp

                  Filesize

                  164KB

                • memory/1260-101-0x00000000029E0000-0x0000000002A09000-memory.dmp

                  Filesize

                  164KB

                • memory/1260-102-0x00000000029E0000-0x0000000002A09000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-58-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-105-0x00000000005C0000-0x00000000005E9000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-59-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-66-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-67-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-56-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-55-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-62-0x0000000000410440-mapping.dmp

                • memory/1580-108-0x00000000005C0000-0x00000000005E9000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-107-0x00000000005C0000-0x00000000005E9000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-106-0x00000000005C0000-0x00000000005E9000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-61-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1580-109-0x00000000005C0000-0x00000000005D2000-memory.dmp

                  Filesize

                  72KB

                • memory/1580-65-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

                  Filesize

                  8KB

                • memory/1580-112-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1672-54-0x0000000000400000-0x0000000000412000-memory.dmp

                  Filesize

                  72KB

                • memory/1672-64-0x0000000000400000-0x0000000000412000-memory.dmp

                  Filesize

                  72KB

                • memory/1744-115-0x0000000000220000-0x0000000000249000-memory.dmp

                  Filesize

                  164KB

                • memory/1744-118-0x0000000000220000-0x0000000000249000-memory.dmp

                  Filesize

                  164KB

                • memory/1744-116-0x0000000000220000-0x0000000000249000-memory.dmp

                  Filesize

                  164KB

                • memory/1744-117-0x0000000000220000-0x0000000000249000-memory.dmp

                  Filesize

                  164KB

                • memory/1768-130-0x0000000000000000-mapping.dmp

                • memory/1768-131-0x000007FEFB761000-0x000007FEFB763000-memory.dmp

                  Filesize

                  8KB

                • memory/1804-82-0x0000000000400000-0x0000000000412000-memory.dmp

                  Filesize

                  72KB

                • memory/1804-70-0x0000000000000000-mapping.dmp

                • memory/1912-110-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1912-80-0x0000000000410440-mapping.dmp

                • memory/1912-129-0x0000000000400000-0x0000000000429000-memory.dmp

                  Filesize

                  164KB

                • memory/1932-128-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmp

                  Filesize

                  8KB