Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 21:13

General

  • Target

    98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe

  • Size

    361KB

  • MD5

    39695f6fd6d15439e921ec318b7faede

  • SHA1

    4f817c4611fbc0e6d52e252411a785d85c37c2da

  • SHA256

    98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d

  • SHA512

    3930792f714b2bb6f25b2f90692e33091258f3914e14ccb147c43e90b027247ba333e921c52051929eb1f489f9f2e3cc5b70826fc1597871ee0235e60e6a1838

  • SSDEEP

    6144:GflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:GflfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe
    "C:\Users\Admin\AppData\Local\Temp\98d70ba57f470df522aca90f49ac112412353900ed9242f131a79bc8c4d5be2d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Temp\gzsdwpibvozslexq.exe
      C:\Temp\gzsdwpibvozslexq.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\hburlicvse.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1032
        • C:\Temp\hburlicvse.exe
          C:\Temp\hburlicvse.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1968
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1956
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:856
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • C:\Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • C:\Temp\gzsdwpibvozslexq.exe

    Filesize

    361KB

    MD5

    8be203edfc3f32ab096771791d75d93f

    SHA1

    13cd6780d9391afcf2e23e29383d90f65bf14816

    SHA256

    b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7

    SHA512

    5cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b

  • C:\Temp\gzsdwpibvozslexq.exe

    Filesize

    361KB

    MD5

    8be203edfc3f32ab096771791d75d93f

    SHA1

    13cd6780d9391afcf2e23e29383d90f65bf14816

    SHA256

    b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7

    SHA512

    5cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b

  • C:\Temp\hburlicvse.exe

    Filesize

    361KB

    MD5

    84ffee277c13c7532dcb929a332ed393

    SHA1

    9e6cf848a7fc2cc765f3842ea9ebe5875b6c068b

    SHA256

    131465eed89c7d6f8cff2f4d6024528a7fcaa45acb6bd4a51c0bcbfd9434649d

    SHA512

    33bdd8ba828351c36c54305f89dfc4d210fe8b64fe55569bf143c913a404f1d9976814af7bc57bd3a0bed15e897a898adbeb71f07c7a38669780a067264cd75a

  • C:\temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • \Temp\CreateProcess.exe

    Filesize

    3KB

    MD5

    5f97334695332daabb9b8d3ef8ebe300

    SHA1

    5653c2ae6538c24a182b7d54a613c8f0fb1aa577

    SHA256

    7df4688536c41159a51589f4b74ad3d4aece527a29f52738e84b985bc2aa8b49

    SHA512

    00229a81826cabe9af5e2e63a7092f9048e762fcdf42f9542a306e88c7755c843fc8032e49bdde3398ac4b5d5a0e0ff3d1c205519860e66d324e97c2354a530e

  • \Temp\gzsdwpibvozslexq.exe

    Filesize

    361KB

    MD5

    8be203edfc3f32ab096771791d75d93f

    SHA1

    13cd6780d9391afcf2e23e29383d90f65bf14816

    SHA256

    b92319427bd2527e9bd3424fbd877bb71cad92798df971af0e2431175b2edba7

    SHA512

    5cee2321bde993cbfa10d971c23c20fa24ec3978d6c0b50fdf7a2834eae37e54b126dc5c7f713d0f6a8790e44768cbccead5804d4b99c61e190f6beb52cf5f7b