Analysis

  • max time kernel
    152s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 00:39

General

  • Target

    da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe

  • Size

    359KB

  • MD5

    d87348fea9f73f3eb70cfaa85be58e1f

  • SHA1

    0cd52b8d8908c2554388c771821e62d628105704

  • SHA256

    da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69

  • SHA512

    f85978289b435b1bc8a3789b0c2507a450fe256570fc87562c995fe523f6e323d6cc1283d339b9c8cd1cb5e5263aacd1afa1950141b96b778deb308b9d6a626a

  • SSDEEP

    6144:E3Dk4W2GD/XQ9u/xUffWkMk4T5iup7blk2k7uEcldPlLWAfTfb9btTm:AcD/XQA/Wnb65lJgk9yAy

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1296
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe
          "C:\Users\Admin\AppData\Local\Temp\da7d74e6ca9d10a56ca2788ae0630a528adebe918db333ecd18416ccf3d07c69.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe
            "C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1400
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp888970da.bat"
            3⤵
            • Deletes itself
            PID:1488
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1216

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp888970da.bat

          Filesize

          307B

          MD5

          e933872b3e523e0bf7dec317cb269b70

          SHA1

          50a644a47524e1e2bc82093bcf0e5aaddfd4d516

          SHA256

          65d30da5f94ba8fd9047b24a015732a6697d712820303ebdb2400db01c79f4d3

          SHA512

          46d584bdadd64dbe99ddb630fbe1ef2da6036f1e71f37f79401f1370e1d74b2889ee0d975ac0bcee73e4981ebc8514d6315e837307c1edebf5302de4d3674395

        • C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe

          Filesize

          359KB

          MD5

          c43eefda125f51ecdd03f5bfd67678de

          SHA1

          9f080f2966214311ab1cba2e29c201d0ba8fc061

          SHA256

          73971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec

          SHA512

          b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d

        • C:\Users\Admin\AppData\Roaming\Ocifwe\uriht.exe

          Filesize

          359KB

          MD5

          c43eefda125f51ecdd03f5bfd67678de

          SHA1

          9f080f2966214311ab1cba2e29c201d0ba8fc061

          SHA256

          73971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec

          SHA512

          b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d

        • \Users\Admin\AppData\Roaming\Ocifwe\uriht.exe

          Filesize

          359KB

          MD5

          c43eefda125f51ecdd03f5bfd67678de

          SHA1

          9f080f2966214311ab1cba2e29c201d0ba8fc061

          SHA256

          73971769a8700ea3f076d3a43d702adc49e8a3e7f8ecbfa2d10f5675a2f560ec

          SHA512

          b78e517a5915f6f6b38670ced263c71ebb68b161b84afd693731c86d26de40f3a7214eeb991faf62d39bffa67dd5902e7eba0dd64826c3e8691f119648bf1d6d

        • memory/576-99-0x0000000000320000-0x000000000036C000-memory.dmp

          Filesize

          304KB

        • memory/576-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

          Filesize

          8KB

        • memory/576-56-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/576-100-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/576-82-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/576-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/576-88-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/576-55-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/576-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/576-87-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/576-86-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/576-85-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/576-84-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/576-83-0x0000000000450000-0x000000000049C000-memory.dmp

          Filesize

          304KB

        • memory/1216-66-0x0000000001C10000-0x0000000001C5C000-memory.dmp

          Filesize

          304KB

        • memory/1216-62-0x0000000001C10000-0x0000000001C5C000-memory.dmp

          Filesize

          304KB

        • memory/1216-64-0x0000000001C10000-0x0000000001C5C000-memory.dmp

          Filesize

          304KB

        • memory/1216-65-0x0000000001C10000-0x0000000001C5C000-memory.dmp

          Filesize

          304KB

        • memory/1216-67-0x0000000001C10000-0x0000000001C5C000-memory.dmp

          Filesize

          304KB

        • memory/1296-72-0x0000000001BD0000-0x0000000001C1C000-memory.dmp

          Filesize

          304KB

        • memory/1296-73-0x0000000001BD0000-0x0000000001C1C000-memory.dmp

          Filesize

          304KB

        • memory/1296-71-0x0000000001BD0000-0x0000000001C1C000-memory.dmp

          Filesize

          304KB

        • memory/1296-70-0x0000000001BD0000-0x0000000001C1C000-memory.dmp

          Filesize

          304KB

        • memory/1376-76-0x0000000002A10000-0x0000000002A5C000-memory.dmp

          Filesize

          304KB

        • memory/1376-77-0x0000000002A10000-0x0000000002A5C000-memory.dmp

          Filesize

          304KB

        • memory/1376-78-0x0000000002A10000-0x0000000002A5C000-memory.dmp

          Filesize

          304KB

        • memory/1376-79-0x0000000002A10000-0x0000000002A5C000-memory.dmp

          Filesize

          304KB

        • memory/1400-112-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1400-111-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1400-110-0x00000000002A0000-0x00000000002EC000-memory.dmp

          Filesize

          304KB

        • memory/1488-102-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-103-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-104-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1488-97-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1488-109-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1488-96-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1488-95-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB

        • memory/1488-93-0x0000000000050000-0x000000000009C000-memory.dmp

          Filesize

          304KB