Analysis

  • max time kernel
    187s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 02:12

General

  • Target

    76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe

  • Size

    298KB

  • MD5

    829e0ad3103a281fd798f2df793dd39b

  • SHA1

    f83e690b914331f59915d5ff3f290431dc0dcbd2

  • SHA256

    76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de

  • SHA512

    c90527b600f15215ebebdc4b208a6ae758bb662894e24ae7c9c69ea64fa4c1b21f52448ae389662def170f62e2752ce3f980349495771155d8129b57fca25b3a

  • SSDEEP

    6144:FQ8uksvUGxVVeDa0t8EYkJECEMnj05RoWfvh8EybgjmT72bA22g9:O8KVVeDaZEL7/joRoDjUhA2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe
        "C:\Users\Admin\AppData\Local\Temp\76c90a0b9eb3be69885975becb54ba808dc57413ed68ce4b7d5afbd460ed51de.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe
          "C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1052
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd8140db2.bat"
          3⤵
          • Deletes itself
          PID:532
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1236
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1132
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "-1426104846-633057510195175572413762642061728105048-62111946473986701217889130"
          1⤵
            PID:292

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\wiyrd.omw

            Filesize

            466B

            MD5

            6bc4b222ad5ccbff5630ff07f346628b

            SHA1

            224d32c228e6f001b48e87473cfb7405cc99ebbb

            SHA256

            657ff4c67a7e52eec19d54dd91e012ac21cda0ca52432e8396b9477389317ef8

            SHA512

            0f0ae62cd985aec728ab5fa8ed0216de2766431803203cf0537d3b203e12a2c0d32816dcd44714701aa11278747d21c77af25c4809280ae73e9cc65ed1a22665

          • C:\Users\Admin\AppData\Local\Temp\tmpd8140db2.bat

            Filesize

            307B

            MD5

            acab2e63d86c44c01b1b74c6ef29ed18

            SHA1

            7184bac771517053a35423920ddb20e85d41a0ba

            SHA256

            27912755ac2951d3a2702b0b1094051897dc2e88387371f010885386249bbd84

            SHA512

            37472aa622e566e5f68c8d007f80f8d71702f25152fadb1b368d1665b0b329fafd919ab6d40fda0ac20a50fc8fc3e2eccd91af77d6c5c91da5308d0148a4e5cc

          • C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe

            Filesize

            298KB

            MD5

            57698a19712ac4525579041c532cf936

            SHA1

            8a3d4f07bd2f344d6cb327c14df8d4805b728dcb

            SHA256

            94ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216

            SHA512

            4a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27

          • C:\Users\Admin\AppData\Roaming\Xaevze\urhuci.exe

            Filesize

            298KB

            MD5

            57698a19712ac4525579041c532cf936

            SHA1

            8a3d4f07bd2f344d6cb327c14df8d4805b728dcb

            SHA256

            94ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216

            SHA512

            4a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27

          • \Users\Admin\AppData\Roaming\Xaevze\urhuci.exe

            Filesize

            298KB

            MD5

            57698a19712ac4525579041c532cf936

            SHA1

            8a3d4f07bd2f344d6cb327c14df8d4805b728dcb

            SHA256

            94ecfed1738a3061e0319752cb35b6dcc8890eaf1d10f0d138f598e83174f216

            SHA512

            4a74f0b07cb94155673cacce63f1586b53c343b3bb4c1a991c4db2a149b5b5d6ec687b74332418cfa920095d8979f0d425c5d13cee4db240cd80067ac6a01e27

          • memory/292-109-0x0000000001BE0000-0x0000000001C24000-memory.dmp

            Filesize

            272KB

          • memory/292-110-0x0000000001BE0000-0x0000000001C24000-memory.dmp

            Filesize

            272KB

          • memory/292-112-0x0000000001BE0000-0x0000000001C24000-memory.dmp

            Filesize

            272KB

          • memory/292-111-0x0000000001BE0000-0x0000000001C24000-memory.dmp

            Filesize

            272KB

          • memory/532-101-0x00000000000671E6-mapping.dmp

          • memory/532-114-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/532-105-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/532-97-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/532-98-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/532-96-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/532-94-0x0000000000050000-0x0000000000094000-memory.dmp

            Filesize

            272KB

          • memory/1052-63-0x0000000001280000-0x00000000012CF000-memory.dmp

            Filesize

            316KB

          • memory/1052-59-0x0000000000000000-mapping.dmp

          • memory/1052-115-0x0000000001280000-0x00000000012CF000-memory.dmp

            Filesize

            316KB

          • memory/1052-90-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1052-99-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1132-68-0x0000000001EB0000-0x0000000001EF4000-memory.dmp

            Filesize

            272KB

          • memory/1132-71-0x0000000001EB0000-0x0000000001EF4000-memory.dmp

            Filesize

            272KB

          • memory/1132-66-0x0000000001EB0000-0x0000000001EF4000-memory.dmp

            Filesize

            272KB

          • memory/1132-69-0x0000000001EB0000-0x0000000001EF4000-memory.dmp

            Filesize

            272KB

          • memory/1132-70-0x0000000001EB0000-0x0000000001EF4000-memory.dmp

            Filesize

            272KB

          • memory/1236-74-0x00000000001E0000-0x0000000000224000-memory.dmp

            Filesize

            272KB

          • memory/1236-77-0x00000000001E0000-0x0000000000224000-memory.dmp

            Filesize

            272KB

          • memory/1236-75-0x00000000001E0000-0x0000000000224000-memory.dmp

            Filesize

            272KB

          • memory/1236-76-0x00000000001E0000-0x0000000000224000-memory.dmp

            Filesize

            272KB

          • memory/1280-83-0x0000000002B10000-0x0000000002B54000-memory.dmp

            Filesize

            272KB

          • memory/1280-82-0x0000000002B10000-0x0000000002B54000-memory.dmp

            Filesize

            272KB

          • memory/1280-80-0x0000000002B10000-0x0000000002B54000-memory.dmp

            Filesize

            272KB

          • memory/1280-81-0x0000000002B10000-0x0000000002B54000-memory.dmp

            Filesize

            272KB

          • memory/1700-87-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-54-0x0000000001380000-0x00000000013CF000-memory.dmp

            Filesize

            316KB

          • memory/1700-88-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-103-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1700-102-0x0000000001380000-0x00000000013CF000-memory.dmp

            Filesize

            316KB

          • memory/1700-91-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-86-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-100-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-89-0x0000000000320000-0x0000000000364000-memory.dmp

            Filesize

            272KB

          • memory/1700-62-0x0000000001280000-0x00000000012CF000-memory.dmp

            Filesize

            316KB

          • memory/1700-61-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1700-56-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1700-57-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1700-55-0x00000000764C1000-0x00000000764C3000-memory.dmp

            Filesize

            8KB