Analysis

  • max time kernel
    157s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 21:12

General

  • Target

    99dbafe17c167e692833d874f826079559df78387942c759e362f209174dfed5.exe

  • Size

    361KB

  • MD5

    f645494f7bd19b4a6c9edb007324af76

  • SHA1

    9131e36ccd6595b4d4d68d2b1d7b3be6300c384d

  • SHA256

    99dbafe17c167e692833d874f826079559df78387942c759e362f209174dfed5

  • SHA512

    678828c5f6b99f72199504908c6b8706934a0fbb4c1cd14a52f92fecbe9653ce9a5d383115800a5fd435309926e65793ec1a39f26a5c457c107ec0b752665565

  • SSDEEP

    6144:SflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:SflfAsiVGjSGecvX

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Executes dropped EXE 11 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99dbafe17c167e692833d874f826079559df78387942c759e362f209174dfed5.exe
    "C:\Users\Admin\AppData\Local\Temp\99dbafe17c167e692833d874f826079559df78387942c759e362f209174dfed5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Temp\zupjhbztrmjecwuo.exe
      C:\Temp\zupjhbztrmjecwuo.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\wrojhbztrl.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3652
        • C:\Temp\wrojhbztrl.exe
          C:\Temp\wrojhbztrl.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3864
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2716
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:944
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_wrojhbztrl.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:3504
        • C:\Temp\i_wrojhbztrl.exe
          C:\Temp\i_wrojhbztrl.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4344
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\trljdbwtom.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1916
        • C:\Temp\trljdbwtom.exe
          C:\Temp\trljdbwtom.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:332
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1552
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:2088
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_trljdbwtom.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1336
        • C:\Temp\i_trljdbwtom.exe
          C:\Temp\i_trljdbwtom.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1364
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4224 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2364
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80

        • C:\Temp\i_trljdbwtom.exe

          Filesize

          361KB

          MD5

          8fc12f04e0d851d32cbe9f79a2e1f1ae

          SHA1

          bef4d9145cda31cd135f7c331487a61dc6927f70

          SHA256

          d063aaf4d9d4eeb04f7c578359285b799f266748976b88dc180b118ea3015946

          SHA512

          f55f41ee32473686cb62dac0d894d5c851e2c91ea4320f5e3df9ee1a663a99fc054fc0f56d5c508307f136befc148ea3f26b3c4561f22dfc1178b2e7322fb897

        • C:\Temp\i_trljdbwtom.exe

          Filesize

          361KB

          MD5

          8fc12f04e0d851d32cbe9f79a2e1f1ae

          SHA1

          bef4d9145cda31cd135f7c331487a61dc6927f70

          SHA256

          d063aaf4d9d4eeb04f7c578359285b799f266748976b88dc180b118ea3015946

          SHA512

          f55f41ee32473686cb62dac0d894d5c851e2c91ea4320f5e3df9ee1a663a99fc054fc0f56d5c508307f136befc148ea3f26b3c4561f22dfc1178b2e7322fb897

        • C:\Temp\i_wrojhbztrl.exe

          Filesize

          361KB

          MD5

          7aa894349e48a886ab5e2bc05135f792

          SHA1

          143f7e962ad0fb8c732f40d46542f0686f95e175

          SHA256

          9c58696b6771cd1392dbee3d302bf26500029c5fb4b3e7c0927eaad31458c4cb

          SHA512

          03add3f26a6000ef533180e407889dcda9eaafe074cf5eb98a9f9ee5d38d4b2e18486ff4d25ee4027e1e67a8e37b7c38e06f4a5012355d23a8851bc3610b694c

        • C:\Temp\i_wrojhbztrl.exe

          Filesize

          361KB

          MD5

          7aa894349e48a886ab5e2bc05135f792

          SHA1

          143f7e962ad0fb8c732f40d46542f0686f95e175

          SHA256

          9c58696b6771cd1392dbee3d302bf26500029c5fb4b3e7c0927eaad31458c4cb

          SHA512

          03add3f26a6000ef533180e407889dcda9eaafe074cf5eb98a9f9ee5d38d4b2e18486ff4d25ee4027e1e67a8e37b7c38e06f4a5012355d23a8851bc3610b694c

        • C:\Temp\trljdbwtom.exe

          Filesize

          361KB

          MD5

          f0f8151be4e961aa26b2833646cce048

          SHA1

          c94ed0ffb29960eb86adb0040f9ab48c8797db45

          SHA256

          4e5452c94c425b0839577b9edba71018327420b9f4147007ad111a969af0db80

          SHA512

          43890b20578313aed5fe72e7cad5abeeafbb5e5e60b7c20a7eca2440b63f4defc90f6d1ae4589e6997f017125ee0c84c2b837f281958a7c75c3237f305638803

        • C:\Temp\trljdbwtom.exe

          Filesize

          361KB

          MD5

          f0f8151be4e961aa26b2833646cce048

          SHA1

          c94ed0ffb29960eb86adb0040f9ab48c8797db45

          SHA256

          4e5452c94c425b0839577b9edba71018327420b9f4147007ad111a969af0db80

          SHA512

          43890b20578313aed5fe72e7cad5abeeafbb5e5e60b7c20a7eca2440b63f4defc90f6d1ae4589e6997f017125ee0c84c2b837f281958a7c75c3237f305638803

        • C:\Temp\wrojhbztrl.exe

          Filesize

          361KB

          MD5

          43c6829240236872aabc2a3a4b7482e5

          SHA1

          f5e76d5892bdb54eef5b35c1448d069a6e4a6d77

          SHA256

          f4062d712dcb73da9b05b0db654a5f6993c3feb460bc8d7b67d8689edd028159

          SHA512

          febd6c7a1f01dfca11481a9da8ee874934f65255f995ef1bcc52570e67ec54ebccf33834b97537117fd6368138a2222c14fb3f8ff0ce521af5804357577bf8e1

        • C:\Temp\wrojhbztrl.exe

          Filesize

          361KB

          MD5

          43c6829240236872aabc2a3a4b7482e5

          SHA1

          f5e76d5892bdb54eef5b35c1448d069a6e4a6d77

          SHA256

          f4062d712dcb73da9b05b0db654a5f6993c3feb460bc8d7b67d8689edd028159

          SHA512

          febd6c7a1f01dfca11481a9da8ee874934f65255f995ef1bcc52570e67ec54ebccf33834b97537117fd6368138a2222c14fb3f8ff0ce521af5804357577bf8e1

        • C:\Temp\zupjhbztrmjecwuo.exe

          Filesize

          361KB

          MD5

          386e033a2aa8aca7150042d758bf9cc2

          SHA1

          e718deae62429b533210f12115f9f52499e619be

          SHA256

          037fe6e9bc963a67665c58ab702040d451e5cd8576461fe161e763159477286d

          SHA512

          8eaef357a9c93146ec64cfad5b1e0bfa4197f8e4f865453ad910bcea8beb3fc62c8607496c88b2edf15e44afc62b5a5c4f51806bf170db0eb372620c4946b9c1

        • C:\Temp\zupjhbztrmjecwuo.exe

          Filesize

          361KB

          MD5

          386e033a2aa8aca7150042d758bf9cc2

          SHA1

          e718deae62429b533210f12115f9f52499e619be

          SHA256

          037fe6e9bc963a67665c58ab702040d451e5cd8576461fe161e763159477286d

          SHA512

          8eaef357a9c93146ec64cfad5b1e0bfa4197f8e4f865453ad910bcea8beb3fc62c8607496c88b2edf15e44afc62b5a5c4f51806bf170db0eb372620c4946b9c1

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          1ececdc523c05287f14ac681c04a4087

          SHA1

          7d502ac3ce064e964e0d1c94c1c4cc30f2b63d81

          SHA256

          e04c7099211caa71540f2ebdaebaaf950c1f9278fce2429ada360e9973e08870

          SHA512

          a707492ebc73a72aac6d2cd77be509471e38a6992dedc55f239f61392b75040fd92f015a02cdc89e65b2435408a08341000290f4ea6a70f6f0ab93f2f5dc2b80