Analysis

  • max time kernel
    154s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 21:08

General

  • Target

    e8160af3c2faa583779e09e81690811233ee6f9541a691d563f2efd2d8f8b389.exe

  • Size

    361KB

  • MD5

    e0a42a639f382f25a111362ad5220a05

  • SHA1

    780cbf17a8d5f72549b0feba63f7514f740c16aa

  • SHA256

    e8160af3c2faa583779e09e81690811233ee6f9541a691d563f2efd2d8f8b389

  • SHA512

    9bb2f544c582e8ce2dc86fc8de08070a1b71f1769533d9b70153e7efd34f45d92bf5a946bd5ab14d992c76389cc2f6498c9806bbfa32ec9f3d4fcde709a143fa

  • SSDEEP

    6144:YflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:YflfAsiVGjSGecvX

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
  • Executes dropped EXE 16 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8160af3c2faa583779e09e81690811233ee6f9541a691d563f2efd2d8f8b389.exe
    "C:\Users\Admin\AppData\Local\Temp\e8160af3c2faa583779e09e81690811233ee6f9541a691d563f2efd2d8f8b389.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Temp\gaytqljdbvtnlgdy.exe
      C:\Temp\gaytqljdbvtnlgdy.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\fdxvqnigay.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3568
        • C:\Temp\fdxvqnigay.exe
          C:\Temp\fdxvqnigay.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4576
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1460
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_fdxvqnigay.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2904
        • C:\Temp\i_fdxvqnigay.exe
          C:\Temp\i_fdxvqnigay.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3748
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\qljdbvtolg.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2660
        • C:\Temp\qljdbvtolg.exe
          C:\Temp\qljdbvtolg.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:796
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2888
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_qljdbvtolg.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4996
        • C:\Temp\i_qljdbvtolg.exe
          C:\Temp\i_qljdbvtolg.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4156
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\rmgezwrpjh.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:4744
        • C:\Temp\rmgezwrpjh.exe
          C:\Temp\rmgezwrpjh.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4640
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:440
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:2828
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_rmgezwrpjh.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:372
        • C:\Temp\i_rmgezwrpjh.exe
          C:\Temp\i_rmgezwrpjh.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3988
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1388 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4228
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:932
  • C:\windows\system32\ipconfig.exe
    C:\windows\system32\ipconfig.exe /release
    1⤵
    • Gathers network information
    PID:2256

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965

        • C:\Temp\fdxvqnigay.exe

          Filesize

          361KB

          MD5

          d1c995f29551a8d580d245e50e63b6a6

          SHA1

          86b029026085f500e7d804c1638c8aade2e3620c

          SHA256

          bf7c899c2d43e8cdef1b4bbb073505e5068850a1043bd1e819cec22377746644

          SHA512

          a58544535f0dfcb04fc13920062650b3928fe6e3226aaf94eb4d0fcb8f4404f7962ada35351595d9a352230cc41aab2cc0fffcec6e4699a61b215d06a9806400

        • C:\Temp\fdxvqnigay.exe

          Filesize

          361KB

          MD5

          d1c995f29551a8d580d245e50e63b6a6

          SHA1

          86b029026085f500e7d804c1638c8aade2e3620c

          SHA256

          bf7c899c2d43e8cdef1b4bbb073505e5068850a1043bd1e819cec22377746644

          SHA512

          a58544535f0dfcb04fc13920062650b3928fe6e3226aaf94eb4d0fcb8f4404f7962ada35351595d9a352230cc41aab2cc0fffcec6e4699a61b215d06a9806400

        • C:\Temp\gaytqljdbvtnlgdy.exe

          Filesize

          361KB

          MD5

          cf95930dc7088ec186d422a4ef995d7f

          SHA1

          d3b4de8e63e9730b6e28d3c96be58bad3e179631

          SHA256

          1b0a0046343dcb70efd227c08f875829abd2d9f1b96d4ea8c0ed32f5f28654de

          SHA512

          ffcd5390184e18a811f30ed724b607f990b66dbc8c560f9f1b9e9c6a8d5aae743d1cb7bb13bbca09f5f5906e441f2dc91419ade77f003faa255cf74f7cdb349d

        • C:\Temp\gaytqljdbvtnlgdy.exe

          Filesize

          361KB

          MD5

          cf95930dc7088ec186d422a4ef995d7f

          SHA1

          d3b4de8e63e9730b6e28d3c96be58bad3e179631

          SHA256

          1b0a0046343dcb70efd227c08f875829abd2d9f1b96d4ea8c0ed32f5f28654de

          SHA512

          ffcd5390184e18a811f30ed724b607f990b66dbc8c560f9f1b9e9c6a8d5aae743d1cb7bb13bbca09f5f5906e441f2dc91419ade77f003faa255cf74f7cdb349d

        • C:\Temp\i_fdxvqnigay.exe

          Filesize

          361KB

          MD5

          81388015a05714f45f15bf42ee3adf99

          SHA1

          fb3697d906ed820b5bbe8c9302bb09c00bd137ce

          SHA256

          77b2999338a6ddd7bf811ab6df5dae1a90c3f2da9b7eafb2029c4e603547c436

          SHA512

          a28eacf606bc7fc7f9296e5d951796879318db415d5f55a8872faafab72229439328e5d79ceb1a4ff1c852d9cc1e516a4984ecff911b482aa8356f2f525a309a

        • C:\Temp\i_fdxvqnigay.exe

          Filesize

          361KB

          MD5

          81388015a05714f45f15bf42ee3adf99

          SHA1

          fb3697d906ed820b5bbe8c9302bb09c00bd137ce

          SHA256

          77b2999338a6ddd7bf811ab6df5dae1a90c3f2da9b7eafb2029c4e603547c436

          SHA512

          a28eacf606bc7fc7f9296e5d951796879318db415d5f55a8872faafab72229439328e5d79ceb1a4ff1c852d9cc1e516a4984ecff911b482aa8356f2f525a309a

        • C:\Temp\i_qljdbvtolg.exe

          Filesize

          361KB

          MD5

          e21b9dff2a628cd0261697c03718672a

          SHA1

          00782649ba1d5e95b025dfd6eda09aeaec1b585a

          SHA256

          b2fc5521bb1c01df2903615c0a70f877da3d36bb522c056f2afaa25372df7f44

          SHA512

          0256d317c6e98543e5f9a983fd2e647ec1743b720bb1e9e82248cf743d9e1e389236a842f0325605e8cb38ca39b6445e6137dcc119a87186504464d02313b678

        • C:\Temp\i_qljdbvtolg.exe

          Filesize

          361KB

          MD5

          e21b9dff2a628cd0261697c03718672a

          SHA1

          00782649ba1d5e95b025dfd6eda09aeaec1b585a

          SHA256

          b2fc5521bb1c01df2903615c0a70f877da3d36bb522c056f2afaa25372df7f44

          SHA512

          0256d317c6e98543e5f9a983fd2e647ec1743b720bb1e9e82248cf743d9e1e389236a842f0325605e8cb38ca39b6445e6137dcc119a87186504464d02313b678

        • C:\Temp\i_rmgezwrpjh.exe

          Filesize

          361KB

          MD5

          8aaf25329114be118998cc33bd1d1fe8

          SHA1

          ae8e6100c1cd37dd47aa6b93a1cf632d4fb0b171

          SHA256

          fbfa999e62e047f64f24b165f03a60d1d1f794f51ffa2070617544c571145e28

          SHA512

          c5df44a0362380cee67ff31e41495f0ec5154f68e2c7c74a98d230f946dbeb94f5f99ddb0221396e73d3011d2253beba6acbb2e1fc1997f3f116d94f3bb614a4

        • C:\Temp\i_rmgezwrpjh.exe

          Filesize

          361KB

          MD5

          8aaf25329114be118998cc33bd1d1fe8

          SHA1

          ae8e6100c1cd37dd47aa6b93a1cf632d4fb0b171

          SHA256

          fbfa999e62e047f64f24b165f03a60d1d1f794f51ffa2070617544c571145e28

          SHA512

          c5df44a0362380cee67ff31e41495f0ec5154f68e2c7c74a98d230f946dbeb94f5f99ddb0221396e73d3011d2253beba6acbb2e1fc1997f3f116d94f3bb614a4

        • C:\Temp\qljdbvtolg.exe

          Filesize

          361KB

          MD5

          f0fc7c489fe4acaa8d1839cfb7eccddc

          SHA1

          7028e0300364a13f3b4db6e9bdeb06848371d965

          SHA256

          60cc09127767218e013de9c2cf81144dc460e25474f5859bb16251ef1527bea8

          SHA512

          100b91a81209e445009e0f5a9af1972fd0a9553b3191a7d292d142ea547f472eeddf84e2cd6ecbd75829f3ee6c3cfc8850089cd733bd02a7f0514978c626b405

        • C:\Temp\qljdbvtolg.exe

          Filesize

          361KB

          MD5

          f0fc7c489fe4acaa8d1839cfb7eccddc

          SHA1

          7028e0300364a13f3b4db6e9bdeb06848371d965

          SHA256

          60cc09127767218e013de9c2cf81144dc460e25474f5859bb16251ef1527bea8

          SHA512

          100b91a81209e445009e0f5a9af1972fd0a9553b3191a7d292d142ea547f472eeddf84e2cd6ecbd75829f3ee6c3cfc8850089cd733bd02a7f0514978c626b405

        • C:\Temp\rmgezwrpjh.exe

          Filesize

          361KB

          MD5

          427545d0dfb42cde0af593f0a7e7b136

          SHA1

          9a7067fc9a94d76a2fb55500324fd308cf709870

          SHA256

          2807d0221cb434bf0a1feb784e11b89ba38aaf801bf1a4bceb7104216dc38e6f

          SHA512

          c03c0a3654f40601e73dd1d46bfac3a5cb985a27f5536eddc8e620722058e7bfbf21c30abccbe5e7bc202247c5c5e40618384619adf9dfe09eb9509815af0315

        • C:\Temp\rmgezwrpjh.exe

          Filesize

          361KB

          MD5

          427545d0dfb42cde0af593f0a7e7b136

          SHA1

          9a7067fc9a94d76a2fb55500324fd308cf709870

          SHA256

          2807d0221cb434bf0a1feb784e11b89ba38aaf801bf1a4bceb7104216dc38e6f

          SHA512

          c03c0a3654f40601e73dd1d46bfac3a5cb985a27f5536eddc8e620722058e7bfbf21c30abccbe5e7bc202247c5c5e40618384619adf9dfe09eb9509815af0315

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          f536b626edb3c6c554fe19e16a69a244

          SHA1

          f94de467113a39fa150308cab822d51916bd5d89

          SHA256

          36917c2b70c38b81876c90a1996af83220ae23b940cdfe50099c9898f4af57f4

          SHA512

          8ecc5736a14650d3c57a97ee542e09caa12ac2a5bca3a2f6f67c1041f859b6cdd8e8b64eab4f04c2b625c0481aa1f09ac253170cbd38157d976d73c60efca965