Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 00:50

General

  • Target

    77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe

  • Size

    296KB

  • MD5

    fcf6059f1fe539b6f01a396e8d0f7935

  • SHA1

    574217abe2b6ec30ad612cb2c742ca0be2ec90d9

  • SHA256

    77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b

  • SHA512

    6739f5ce3ae0aba1352b9e74cacc169f2f75d4f0062cd4efe1503de01b08925870686f36d5f81bf0dbc475fc2da7879b201a857e862e883155b0508eacb3fb15

  • SSDEEP

    6144:qJseH4vk7EO2gHFRQbz7sr3uz6Wfvx59YZiTTNNHel0vzVcna0:neH4MEO2+FqPaNWHx59DTxNXmF

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1168
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1108
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1192
          • C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
            "C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1388
            • C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe
              "C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1252
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\NNM279A.bat"
              3⤵
              • Deletes itself
              PID:1856

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NNM279A.bat

          Filesize

          303B

          MD5

          d611bad72ea8e86e23d0d5e717657199

          SHA1

          b99acd18d133e61965bf984284607e2bf4b8ac54

          SHA256

          6ccdfe2294a1d78a9623df795df3896d2808790f804c7842540286a0999a7f42

          SHA512

          fef786c88a9c3337110f384971ffb130a58f623ba2afae3f6d37ab54b13fa36edb650fb069d5ca3b7ed0e8b3d7a21b9a8a33dabd091051da75f5634bcb2515b7

        • C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe

          Filesize

          296KB

          MD5

          e03948e7228afcba1263fcdf0cb2403c

          SHA1

          e8fbf8f74a901f0556c9931228a132b877ddf07a

          SHA256

          a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5

          SHA512

          b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e

        • C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe

          Filesize

          296KB

          MD5

          e03948e7228afcba1263fcdf0cb2403c

          SHA1

          e8fbf8f74a901f0556c9931228a132b877ddf07a

          SHA256

          a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5

          SHA512

          b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e

        • \Users\Admin\AppData\Roaming\Neweev\acfug.exe

          Filesize

          296KB

          MD5

          e03948e7228afcba1263fcdf0cb2403c

          SHA1

          e8fbf8f74a901f0556c9931228a132b877ddf07a

          SHA256

          a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5

          SHA512

          b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e

        • \Users\Admin\AppData\Roaming\Neweev\acfug.exe

          Filesize

          296KB

          MD5

          e03948e7228afcba1263fcdf0cb2403c

          SHA1

          e8fbf8f74a901f0556c9931228a132b877ddf07a

          SHA256

          a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5

          SHA512

          b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e

        • memory/1108-67-0x0000000000350000-0x0000000000399000-memory.dmp

          Filesize

          292KB

        • memory/1108-69-0x0000000000350000-0x0000000000399000-memory.dmp

          Filesize

          292KB

        • memory/1108-70-0x0000000000350000-0x0000000000399000-memory.dmp

          Filesize

          292KB

        • memory/1108-68-0x0000000000350000-0x0000000000399000-memory.dmp

          Filesize

          292KB

        • memory/1108-65-0x0000000000350000-0x0000000000399000-memory.dmp

          Filesize

          292KB

        • memory/1168-73-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1168-74-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1168-75-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1168-76-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1192-82-0x0000000002B40000-0x0000000002B89000-memory.dmp

          Filesize

          292KB

        • memory/1192-81-0x0000000002B40000-0x0000000002B89000-memory.dmp

          Filesize

          292KB

        • memory/1192-79-0x0000000002B40000-0x0000000002B89000-memory.dmp

          Filesize

          292KB

        • memory/1192-80-0x0000000002B40000-0x0000000002B89000-memory.dmp

          Filesize

          292KB

        • memory/1252-62-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1388-85-0x00000000003B0000-0x00000000003F9000-memory.dmp

          Filesize

          292KB

        • memory/1388-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-54-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1388-86-0x00000000003B0000-0x00000000003F9000-memory.dmp

          Filesize

          292KB

        • memory/1388-87-0x00000000003B0000-0x00000000003F9000-memory.dmp

          Filesize

          292KB

        • memory/1388-88-0x00000000003B0000-0x00000000003F9000-memory.dmp

          Filesize

          292KB

        • memory/1388-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-103-0x00000000003B0000-0x00000000003F9000-memory.dmp

          Filesize

          292KB

        • memory/1388-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-55-0x0000000000401000-0x0000000000442000-memory.dmp

          Filesize

          260KB

        • memory/1388-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1388-56-0x0000000075711000-0x0000000075713000-memory.dmp

          Filesize

          8KB

        • memory/1856-101-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/1856-100-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/1856-99-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/1856-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1856-97-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/1856-113-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB