Analysis

  • max time kernel
    188s
  • max time network
    224s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 05:18

General

  • Target

    c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe

  • Size

    221KB

  • MD5

    979aca3a0e5a1f06d2266be262ff9130

  • SHA1

    40472f7573cc91313fcd3f025959d8c8c67ab1dd

  • SHA256

    c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261

  • SHA512

    f54c07383f1244779f93d94a354e97f921224e849e99e2ecc39b6a9e504dfea42fb4c85b4c634f720fe844d2b231edee4a772b7b2c6d79e1a7fbd34c8db3806c

  • SSDEEP

    3072:zXT8bOA9OxjMGBg5xah9p06qDRoZ32BktfDI+0STbjXPa5QqnnhSiOuzcspefC:3A81Bg50pjmBKXpbjXrWnhauUfC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe
    "C:\Users\Admin\AppData\Local\Temp\c6fff6828393b4fcbdb662b2a0b7fe85879aeecd4f34b9b1f20e5d51a8da7261.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe
      "C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:340
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8e5ab766.bat"
      2⤵
        PID:1760
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1312
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1276
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1176
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1252
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "-1934140490-6625278351248190404-20203295-12574983751843041061-14749818861261163745"
              1⤵
                PID:1948
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:2040
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:844
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1976
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:628

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Roaming\Gedy\uwaqe.peg

                        Filesize

                        4KB

                        MD5

                        f208d079203fa1c734edc0450c35ee77

                        SHA1

                        94db3901124e1592dab6b5e74ee6f77af966e641

                        SHA256

                        fc7e1e10a692e5c50bddaef9c8b43a786256ce689f6f133763385aae658138ce

                        SHA512

                        fe261f20ffe5f88d8df2bc1026e9444dee375013d143878a904203403c82ad063f04307bc9987ac1eea4c77cc4178a3087cb402af135af78e58bdb198d7e2d85

                      • C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe

                        Filesize

                        221KB

                        MD5

                        42a63ae58ed2757989489881b585ec8d

                        SHA1

                        3dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f

                        SHA256

                        78f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f

                        SHA512

                        cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8

                      • C:\Users\Admin\AppData\Roaming\Usatug\ofeh.exe

                        Filesize

                        221KB

                        MD5

                        42a63ae58ed2757989489881b585ec8d

                        SHA1

                        3dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f

                        SHA256

                        78f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f

                        SHA512

                        cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8

                      • \Users\Admin\AppData\Roaming\Usatug\ofeh.exe

                        Filesize

                        221KB

                        MD5

                        42a63ae58ed2757989489881b585ec8d

                        SHA1

                        3dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f

                        SHA256

                        78f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f

                        SHA512

                        cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8

                      • \Users\Admin\AppData\Roaming\Usatug\ofeh.exe

                        Filesize

                        221KB

                        MD5

                        42a63ae58ed2757989489881b585ec8d

                        SHA1

                        3dc9a09bd8ff9d7494c19016a4f33cc8eb1c4f2f

                        SHA256

                        78f832070301a5ffbd0658319f8bf53f016d35c90893526749b34aacdb32873f

                        SHA512

                        cee3453655bb1d27f3a7918712614a6747fd46cb797b3c433b059e92c60cd5f4e470fd3e2fc79457d433f4d5d75fa608727fccda806a41efa088b84958df46c8

                      • memory/340-76-0x0000000000400000-0x00000000004D2000-memory.dmp

                        Filesize

                        840KB

                      • memory/340-102-0x0000000000400000-0x00000000004D2000-memory.dmp

                        Filesize

                        840KB

                      • memory/340-59-0x0000000000000000-mapping.dmp

                      • memory/340-75-0x0000000000270000-0x0000000000274000-memory.dmp

                        Filesize

                        16KB

                      • memory/952-228-0x0000000002230000-0x0000000002302000-memory.dmp

                        Filesize

                        840KB

                      • memory/952-89-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-88-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-87-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-230-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-54-0x0000000075591000-0x0000000075593000-memory.dmp

                        Filesize

                        8KB

                      • memory/952-229-0x0000000000400000-0x00000000004D2000-memory.dmp

                        Filesize

                        840KB

                      • memory/952-86-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-85-0x0000000002230000-0x0000000002269000-memory.dmp

                        Filesize

                        228KB

                      • memory/952-90-0x0000000002230000-0x0000000002302000-memory.dmp

                        Filesize

                        840KB

                      • memory/952-56-0x0000000000400000-0x00000000004D2000-memory.dmp

                        Filesize

                        840KB

                      • memory/952-55-0x0000000000270000-0x0000000000274000-memory.dmp

                        Filesize

                        16KB

                      • memory/952-91-0x0000000000400000-0x00000000004D2000-memory.dmp

                        Filesize

                        840KB

                      • memory/1176-66-0x0000000001CB0000-0x0000000001CE9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1176-63-0x0000000001CB0000-0x0000000001CE9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1176-65-0x0000000001CB0000-0x0000000001CE9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1176-68-0x0000000001CB0000-0x0000000001CE9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1176-67-0x0000000001CB0000-0x0000000001CE9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1276-73-0x00000000001A0000-0x00000000001D9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1276-71-0x00000000001A0000-0x00000000001D9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1276-74-0x00000000001A0000-0x00000000001D9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1276-72-0x00000000001A0000-0x00000000001D9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1312-81-0x0000000002580000-0x00000000025B9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1312-82-0x0000000002580000-0x00000000025B9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1312-80-0x0000000002580000-0x00000000025B9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1312-79-0x0000000002580000-0x00000000025B9000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-112-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-120-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-100-0x000000000006783D-mapping.dmp

                      • memory/1760-104-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-106-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-108-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-110-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-98-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-114-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-116-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-118-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-103-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-122-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-124-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-126-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-132-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-130-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-134-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-128-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-97-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-94-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-96-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB

                      • memory/1760-243-0x0000000000050000-0x0000000000089000-memory.dmp

                        Filesize

                        228KB