Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 00:50
Static task
static1
Behavioral task
behavioral1
Sample
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
Resource
win10v2004-20221111-en
General
-
Target
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe
-
Size
296KB
-
MD5
fcf6059f1fe539b6f01a396e8d0f7935
-
SHA1
574217abe2b6ec30ad612cb2c742ca0be2ec90d9
-
SHA256
77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b
-
SHA512
6739f5ce3ae0aba1352b9e74cacc169f2f75d4f0062cd4efe1503de01b08925870686f36d5f81bf0dbc475fc2da7879b201a857e862e883155b0508eacb3fb15
-
SSDEEP
6144:qJseH4vk7EO2gHFRQbz7sr3uz6Wfvx59YZiTTNNHel0vzVcna0:neH4MEO2+FqPaNWHx59DTxNXmF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1252 acfug.exe -
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run acfug.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Acfug = "C:\\Users\\Admin\\AppData\\Roaming\\Neweev\\acfug.exe" acfug.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe 1252 acfug.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1252 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 27 PID 1388 wrote to memory of 1252 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 27 PID 1388 wrote to memory of 1252 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 27 PID 1388 wrote to memory of 1252 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 27 PID 1252 wrote to memory of 1108 1252 acfug.exe 15 PID 1252 wrote to memory of 1108 1252 acfug.exe 15 PID 1252 wrote to memory of 1108 1252 acfug.exe 15 PID 1252 wrote to memory of 1108 1252 acfug.exe 15 PID 1252 wrote to memory of 1108 1252 acfug.exe 15 PID 1252 wrote to memory of 1168 1252 acfug.exe 14 PID 1252 wrote to memory of 1168 1252 acfug.exe 14 PID 1252 wrote to memory of 1168 1252 acfug.exe 14 PID 1252 wrote to memory of 1168 1252 acfug.exe 14 PID 1252 wrote to memory of 1168 1252 acfug.exe 14 PID 1252 wrote to memory of 1192 1252 acfug.exe 16 PID 1252 wrote to memory of 1192 1252 acfug.exe 16 PID 1252 wrote to memory of 1192 1252 acfug.exe 16 PID 1252 wrote to memory of 1192 1252 acfug.exe 16 PID 1252 wrote to memory of 1192 1252 acfug.exe 16 PID 1252 wrote to memory of 1388 1252 acfug.exe 26 PID 1252 wrote to memory of 1388 1252 acfug.exe 26 PID 1252 wrote to memory of 1388 1252 acfug.exe 26 PID 1252 wrote to memory of 1388 1252 acfug.exe 26 PID 1252 wrote to memory of 1388 1252 acfug.exe 26 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28 PID 1388 wrote to memory of 1856 1388 77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe 28
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe"C:\Users\Admin\AppData\Local\Temp\77f3aa53cae567b4ce6bf7a5dc39527a34f8be5cad891846b395d87fc6d5908b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe"C:\Users\Admin\AppData\Roaming\Neweev\acfug.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\NNM279A.bat"3⤵
- Deletes itself
PID:1856
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5d611bad72ea8e86e23d0d5e717657199
SHA1b99acd18d133e61965bf984284607e2bf4b8ac54
SHA2566ccdfe2294a1d78a9623df795df3896d2808790f804c7842540286a0999a7f42
SHA512fef786c88a9c3337110f384971ffb130a58f623ba2afae3f6d37ab54b13fa36edb650fb069d5ca3b7ed0e8b3d7a21b9a8a33dabd091051da75f5634bcb2515b7
-
Filesize
296KB
MD5e03948e7228afcba1263fcdf0cb2403c
SHA1e8fbf8f74a901f0556c9931228a132b877ddf07a
SHA256a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5
SHA512b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e
-
Filesize
296KB
MD5e03948e7228afcba1263fcdf0cb2403c
SHA1e8fbf8f74a901f0556c9931228a132b877ddf07a
SHA256a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5
SHA512b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e
-
Filesize
296KB
MD5e03948e7228afcba1263fcdf0cb2403c
SHA1e8fbf8f74a901f0556c9931228a132b877ddf07a
SHA256a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5
SHA512b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e
-
Filesize
296KB
MD5e03948e7228afcba1263fcdf0cb2403c
SHA1e8fbf8f74a901f0556c9931228a132b877ddf07a
SHA256a8ee628be2ef63c5e0d88205a0dd7dad20e395611f102b35ef4cde479467f1e5
SHA512b25dadc8dae8c858f28240777347a391f41f293c0fa9bd126f59c219c4e59ccb1464fba0240a91a5819a768457e2642b6da86bd5239cc62fb33a7a6cb75aa15e