Analysis

  • max time kernel
    151s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 18:34

General

  • Target

    612937de6a7ae573ff13b36879bdc62669fa8c3cd3dd4ef471f8fd12942da368.exe

  • Size

    361KB

  • MD5

    d988f7c24487d404f70c1b65df1281b1

  • SHA1

    2d936e717f028e3bf261b5ee4303f2534c4298be

  • SHA256

    612937de6a7ae573ff13b36879bdc62669fa8c3cd3dd4ef471f8fd12942da368

  • SHA512

    b47f9e50da92f82d2d443489f7ae899f1c68d2bbef5fb4e646d4780a0bc2da7fc6245f6ffdebaec21b36a42fb243bffb304a83bdf83e0e3507e4cf60ea94c94e

  • SSDEEP

    6144:KflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:KflfAsiVGjSGecvX

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • Executes dropped EXE 15 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\612937de6a7ae573ff13b36879bdc62669fa8c3cd3dd4ef471f8fd12942da368.exe
    "C:\Users\Admin\AppData\Local\Temp\612937de6a7ae573ff13b36879bdc62669fa8c3cd3dd4ef471f8fd12942da368.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Temp\kecwuomhezwrpjhb.exe
      C:\Temp\kecwuomhezwrpjhb.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\lfdxvqnigs.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2704
        • C:\Temp\lfdxvqnigs.exe
          C:\Temp\lfdxvqnigs.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1828
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:5032
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4820
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_lfdxvqnigs.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1520
        • C:\Temp\i_lfdxvqnigs.exe
          C:\Temp\i_lfdxvqnigs.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:5104
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\wtolgeywqo.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2664
        • C:\Temp\wtolgeywqo.exe
          C:\Temp\wtolgeywqo.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2420
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:388
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1600
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_wtolgeywqo.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4280
        • C:\Temp\i_wtolgeywqo.exe
          C:\Temp\i_wtolgeywqo.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1724
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\xrpjhczurm.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:5108
        • C:\Temp\xrpjhczurm.exe
          C:\Temp\xrpjhczurm.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3688
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1100
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3796
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_xrpjhczurm.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2236
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4020 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:4648
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193

  • C:\Temp\i_lfdxvqnigs.exe

    Filesize

    361KB

    MD5

    5c214854b52226df9598300a813db702

    SHA1

    c7f648b5274109f822155373d84aa5afb7d06b7a

    SHA256

    edae26ad3b146a1a394c7d9aeb7fe834d181202b9ed10c6e34f42721b317b9c1

    SHA512

    244b94799a74f03ee55e7ac032fe91384dfcc8a32f108e2b695bfa8853a85a542f22b2ce67ce1097741bbed79754e2888abb936f9e4d11e989fa50a0ae12196d

  • C:\Temp\i_lfdxvqnigs.exe

    Filesize

    361KB

    MD5

    5c214854b52226df9598300a813db702

    SHA1

    c7f648b5274109f822155373d84aa5afb7d06b7a

    SHA256

    edae26ad3b146a1a394c7d9aeb7fe834d181202b9ed10c6e34f42721b317b9c1

    SHA512

    244b94799a74f03ee55e7ac032fe91384dfcc8a32f108e2b695bfa8853a85a542f22b2ce67ce1097741bbed79754e2888abb936f9e4d11e989fa50a0ae12196d

  • C:\Temp\i_wtolgeywqo.exe

    Filesize

    361KB

    MD5

    241c275fcc996d5ca19f98bd6f3056d3

    SHA1

    74d778af45b960ec22afa425007ec95ac477c8c1

    SHA256

    ae87017a833ebc4b55277d822d12202be522f34169b9c03c1083b0fb9595c9e7

    SHA512

    67c26246e99a8929f7a1e3445481167e412f2b42e58c16968c3973af72e8c00680d187d0aa179cf17da28a6cba2bab50fbeb6eaa02a93937be095aafdadca78d

  • C:\Temp\i_wtolgeywqo.exe

    Filesize

    361KB

    MD5

    241c275fcc996d5ca19f98bd6f3056d3

    SHA1

    74d778af45b960ec22afa425007ec95ac477c8c1

    SHA256

    ae87017a833ebc4b55277d822d12202be522f34169b9c03c1083b0fb9595c9e7

    SHA512

    67c26246e99a8929f7a1e3445481167e412f2b42e58c16968c3973af72e8c00680d187d0aa179cf17da28a6cba2bab50fbeb6eaa02a93937be095aafdadca78d

  • C:\Temp\kecwuomhezwrpjhb.exe

    Filesize

    361KB

    MD5

    1ea2b7284a2532815617863be228fb2b

    SHA1

    f4699e97380fcef6bcc7bf448bd855a98852eb79

    SHA256

    b65b90a2c3ee438df7e55745742b397d37e6d0bac57b8a5bfa78c17afec57655

    SHA512

    f9046922e435bfb361f445e83f841f090c4922cb275c266b9b6d6281d0524caf915d024541275e8f58d7263e4b59b98e44d26cd3f70410fc9bce753f57cf7f42

  • C:\Temp\kecwuomhezwrpjhb.exe

    Filesize

    361KB

    MD5

    1ea2b7284a2532815617863be228fb2b

    SHA1

    f4699e97380fcef6bcc7bf448bd855a98852eb79

    SHA256

    b65b90a2c3ee438df7e55745742b397d37e6d0bac57b8a5bfa78c17afec57655

    SHA512

    f9046922e435bfb361f445e83f841f090c4922cb275c266b9b6d6281d0524caf915d024541275e8f58d7263e4b59b98e44d26cd3f70410fc9bce753f57cf7f42

  • C:\Temp\lfdxvqnigs.exe

    Filesize

    361KB

    MD5

    5a0a2e8ceb8dbda236149175a34b09e4

    SHA1

    1f40268a90f48c2e847d0ead7baf497a541d31cb

    SHA256

    53840302ebb57acedeb857fb9fe3ceeee82df274660f74b3badf1aa0a60c863c

    SHA512

    ab1edbebfe4c864d3e0fd9617d54ea2f06da7df0308acdb3b037594af97acf3073279107d6725b52034e62e399b3370fcb784713737ad7d40e779b9e0f22fa75

  • C:\Temp\lfdxvqnigs.exe

    Filesize

    361KB

    MD5

    5a0a2e8ceb8dbda236149175a34b09e4

    SHA1

    1f40268a90f48c2e847d0ead7baf497a541d31cb

    SHA256

    53840302ebb57acedeb857fb9fe3ceeee82df274660f74b3badf1aa0a60c863c

    SHA512

    ab1edbebfe4c864d3e0fd9617d54ea2f06da7df0308acdb3b037594af97acf3073279107d6725b52034e62e399b3370fcb784713737ad7d40e779b9e0f22fa75

  • C:\Temp\wtolgeywqo.exe

    Filesize

    361KB

    MD5

    4255fd1f9be838d6d6ebb05310b2a6af

    SHA1

    2e76fd82f84fcd8bb42727bf613ddaac08b0b9a4

    SHA256

    73eb4a7218ce72d04e81c05d9a95430e4d52e3bff89e945d4a19613f9385d954

    SHA512

    30e76dafb4148e3c5d59091b5449e68e92634452adc20b2749702b6218fce8995c6c1d7e16d208e6b268080d568e654c5c878ac8d0bd65c96d2089adee707de2

  • C:\Temp\wtolgeywqo.exe

    Filesize

    361KB

    MD5

    4255fd1f9be838d6d6ebb05310b2a6af

    SHA1

    2e76fd82f84fcd8bb42727bf613ddaac08b0b9a4

    SHA256

    73eb4a7218ce72d04e81c05d9a95430e4d52e3bff89e945d4a19613f9385d954

    SHA512

    30e76dafb4148e3c5d59091b5449e68e92634452adc20b2749702b6218fce8995c6c1d7e16d208e6b268080d568e654c5c878ac8d0bd65c96d2089adee707de2

  • C:\Temp\xrpjhczurm.exe

    Filesize

    361KB

    MD5

    6e337235c77c35b53d71003eb2286b64

    SHA1

    98ef2f39066f1275729ebcf8211c040fd8ade1d2

    SHA256

    031b5dced26ecbfb7f970bd555f5114f27cf6951ac7c3b940cafe3b43a79383d

    SHA512

    894e5d4dc923a862c6a15bed8783162599c592a228b2221fb995ab9c2026e4c979b12a0217e96c118e27ecdc17bbd3647adda1cfc2e944b1a7a54acc285c6557

  • C:\Temp\xrpjhczurm.exe

    Filesize

    361KB

    MD5

    6e337235c77c35b53d71003eb2286b64

    SHA1

    98ef2f39066f1275729ebcf8211c040fd8ade1d2

    SHA256

    031b5dced26ecbfb7f970bd555f5114f27cf6951ac7c3b940cafe3b43a79383d

    SHA512

    894e5d4dc923a862c6a15bed8783162599c592a228b2221fb995ab9c2026e4c979b12a0217e96c118e27ecdc17bbd3647adda1cfc2e944b1a7a54acc285c6557

  • C:\temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    d2d7063a1d2408b54ad5d42b07489424

    SHA1

    a812a0169b5ce3a9bb9d3d79fc51f2955bf0019b

    SHA256

    5ec7ca45b1f9a47d81cccda0f70900efba1f5fceaa0550d72a03bed902f68902

    SHA512

    0e686dc36383d93b5012cddcb2c094cf567e0e4e4adb01d0f89ed60e63aa4067583f1ac81951e558ca0fb1ff118261fbd12c5ba455c31bbf924da93108acc193