Analysis

  • max time kernel
    152s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 00:20

General

  • Target

    618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe

  • Size

    321KB

  • MD5

    fc272ce7fefc350db5727354e39dd423

  • SHA1

    1327d500a09bc115b2b7caac85b1b74f06dc2ef8

  • SHA256

    618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287

  • SHA512

    d84c09f15b991e79c342ee4411f4137bb65ae9779d266680df841494ba5ceeb15d17d7fa3b2ca691322763d22a4d35b97c6f165779a65ddf0239c2fdfa321bec

  • SSDEEP

    3072:lNQftfClRajNsEYXFBZU1HJAPCXjUeJs2raRLoO7mbD7R9nIxF+l6qFUT+aqNV40:lNatAaz68H0Kp24aX7Sp9nkF+oTuEjET

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe
        "C:\Users\Admin\AppData\Local\Temp\618b66ebd98be503e3a0521f1f96a609d8338f800d65877f258ec6340023e287.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe
          "C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1612
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9a0716ef.bat"
          3⤵
          • Deletes itself
          • Suspicious use of AdjustPrivilegeToken
          PID:1004
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1192
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1124
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1668
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "1859174906-6570579231492835977-18459092971135926192-177466481660024591-773999302"
            1⤵
              PID:1104
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:848
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1088
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1596
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1592
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:856

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmp9a0716ef.bat

                      Filesize

                      307B

                      MD5

                      87e7283860b6530f6abfa25b99c69d28

                      SHA1

                      e3608a4f91d2fdf46076bac5483843602628bbe1

                      SHA256

                      a3f7e57786e731d4ebe8adca291dcbd98a6d099b2f9490275c22dfa6ceff2f33

                      SHA512

                      a9ceac914754b33272ec822009abe7eb729a161282d2b688ec520d3c40702a98b78d8782808c34e65116194214f56fc37d3a13227dc3eaf02bc44014a04f88f1

                    • C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe

                      Filesize

                      321KB

                      MD5

                      36a229705cfe5a296dd6d9d1f4abe872

                      SHA1

                      be84b4aa013979d28991f5f33dd578ac4d33325c

                      SHA256

                      a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465

                      SHA512

                      9ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b

                    • C:\Users\Admin\AppData\Roaming\Taeq\epbue.exe

                      Filesize

                      321KB

                      MD5

                      36a229705cfe5a296dd6d9d1f4abe872

                      SHA1

                      be84b4aa013979d28991f5f33dd578ac4d33325c

                      SHA256

                      a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465

                      SHA512

                      9ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b

                    • C:\Users\Admin\AppData\Roaming\Xuagip\evbu.pap

                      Filesize

                      421B

                      MD5

                      d5e5330ccf42fdc487aa8f8bc95ff4ec

                      SHA1

                      f1a2faa1c839a0e436fc7a6e21b3a5e98e705c46

                      SHA256

                      631c5503ac1e9992cd5582d9f91b01ef51bc00dee25046dc3323215cdb8297ee

                      SHA512

                      f6df9c9773e1f1b7496b2c044d321254d62fa802af8a85e7232768e2b37c5c96a62ece10b5a4859dd3ec9b5df2706c9977e199af266513fd8f2c2206cb368aaf

                    • C:\Users\Admin\AppData\Roaming\Xuagip\evbu.pap

                      Filesize

                      3KB

                      MD5

                      aacaf4660d16886e4288b9c3fb25194c

                      SHA1

                      7c63f5cbf2e107d9179280c91531a880b6f232ad

                      SHA256

                      7e4a6665542dd58099f562c5daea420bb7df15bb8a7ab563ae22c5806818f00f

                      SHA512

                      06cbd1547c99b2ad97d9d34eb43887c8e7e90e7ab2b9070750d502f9b0afa0901692f2406d9ca8cf82fe5d8b5073c2a60ab12119faf91fc24d0048721aa0d929

                    • \Users\Admin\AppData\Roaming\Taeq\epbue.exe

                      Filesize

                      321KB

                      MD5

                      36a229705cfe5a296dd6d9d1f4abe872

                      SHA1

                      be84b4aa013979d28991f5f33dd578ac4d33325c

                      SHA256

                      a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465

                      SHA512

                      9ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b

                    • \Users\Admin\AppData\Roaming\Taeq\epbue.exe

                      Filesize

                      321KB

                      MD5

                      36a229705cfe5a296dd6d9d1f4abe872

                      SHA1

                      be84b4aa013979d28991f5f33dd578ac4d33325c

                      SHA256

                      a4584ea7006c1ed845f0f8352aa96b465d72bc25d0cb09c0a831e4b48fe2f465

                      SHA512

                      9ad255cd2c5ff6bb6b8ec2514e47d47357a31fc3bb249f6ab066a1f9b55079e24377735ab1749f72cad816aaad01382236520a393e33c7cf83b4b150ab99f84b

                    • memory/1004-131-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-119-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-135-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-200-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-133-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-125-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-129-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-273-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-127-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-121-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-123-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-137-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-117-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-113-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-115-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-111-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-109-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-103-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-104-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-102-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1004-100-0x00000000000C0000-0x00000000000F9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-72-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-70-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-73-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-74-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-75-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-81-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-78-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-79-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-80-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-86-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-87-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-84-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-85-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-94-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-93-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-107-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-90-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-91-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-96-0x00000000004E0000-0x0000000000535000-memory.dmp

                      Filesize

                      340KB

                    • memory/1348-95-0x00000000004E0000-0x0000000000535000-memory.dmp

                      Filesize

                      340KB

                    • memory/1348-106-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-54-0x0000000075B61000-0x0000000075B63000-memory.dmp

                      Filesize

                      8KB

                    • memory/1348-92-0x00000000004E0000-0x0000000000519000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-69-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/1348-55-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-56-0x0000000000270000-0x00000000002A9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1348-57-0x00000000002B0000-0x0000000000305000-memory.dmp

                      Filesize

                      340KB

                    • memory/1348-58-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB

                    • memory/1612-64-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/1612-66-0x0000000000460000-0x0000000000499000-memory.dmp

                      Filesize

                      228KB

                    • memory/1612-67-0x00000000004A0000-0x00000000004F5000-memory.dmp

                      Filesize

                      340KB

                    • memory/1612-68-0x0000000000400000-0x0000000000455000-memory.dmp

                      Filesize

                      340KB