Analysis

  • max time kernel
    151s
  • max time network
    170s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 10:52

General

  • Target

    fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe

  • Size

    355KB

  • MD5

    275cd8b02cdeb8141c0b163f688d0ac7

  • SHA1

    9e5dd32d0ffd156e52626f2434a13f91dcfe0c8a

  • SHA256

    fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f

  • SHA512

    ffe20aadc74631806c7675f3de8452a82b953b5bd6034f0fe86108e6d2dc837a283212ddc7dab70531f4c193c5bf0040e7d21217bbb4f1c47299f76c17793cc9

  • SSDEEP

    6144:lX10fTKi+W9tXyCHPtOB1g0cL2Cn8gczuwpUaFhQLvg:110bKE9tTHPgML2C8gDCUmL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1392
      • C:\Users\Admin\AppData\Local\Temp\fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe
        "C:\Users\Admin\AppData\Local\Temp\fad9711c1409511d9d6016c9528df8a89b0b75de8b402f8864a28edef69ef97f.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe
          "C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:1124
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp2e86c866.bat"
          3⤵
          • Deletes itself
          PID:1604
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1336
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1240

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp2e86c866.bat

          Filesize

          307B

          MD5

          92145999788bc4e17736d9527e39ea9e

          SHA1

          cb88548099475f12238992886612c8fd01bb7362

          SHA256

          3eed3b39dbca6abbd361c047d7d193e65fc8c4fc4a4f9d4b6d1d002ef6d15163

          SHA512

          ea628fe1eac51a9c8a6427c3b01da6a062e37660c6b4a042cecc4dea352c0590254f7b9425dd5db3b8f19149ebf47ee001fc431e559a451d0512ab7eb1559583

        • C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe

          Filesize

          355KB

          MD5

          a2e6d075fc2b24906b353d45abe8d735

          SHA1

          1f620f9080ce89871b4b34b443059592fdb14029

          SHA256

          02243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf

          SHA512

          b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3

        • C:\Users\Admin\AppData\Roaming\Dywatu\buytu.exe

          Filesize

          355KB

          MD5

          a2e6d075fc2b24906b353d45abe8d735

          SHA1

          1f620f9080ce89871b4b34b443059592fdb14029

          SHA256

          02243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf

          SHA512

          b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3

        • \Users\Admin\AppData\Roaming\Dywatu\buytu.exe

          Filesize

          355KB

          MD5

          a2e6d075fc2b24906b353d45abe8d735

          SHA1

          1f620f9080ce89871b4b34b443059592fdb14029

          SHA256

          02243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf

          SHA512

          b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3

        • \Users\Admin\AppData\Roaming\Dywatu\buytu.exe

          Filesize

          355KB

          MD5

          a2e6d075fc2b24906b353d45abe8d735

          SHA1

          1f620f9080ce89871b4b34b443059592fdb14029

          SHA256

          02243945592fcf8c75103eb5438f1b32f6c07a8979cc92bbcd4d97cfc03c06cf

          SHA512

          b6b3230db5320b5e25c74ed48077d39bb9444fd6c57805f200c08515255e9e81e10928fe57c2b5bb0917809dc3abeb23f33323b5060700a782f027e05bad72c3

        • memory/976-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

          Filesize

          8KB

        • memory/976-92-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/976-55-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/976-56-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/976-101-0x0000000000400000-0x0000000000444000-memory.dmp

          Filesize

          272KB

        • memory/976-73-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/976-102-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/976-89-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/976-70-0x0000000000320000-0x0000000000364000-memory.dmp

          Filesize

          272KB

        • memory/976-72-0x0000000000370000-0x00000000003CB000-memory.dmp

          Filesize

          364KB

        • memory/976-91-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/976-90-0x00000000004F0000-0x0000000000534000-memory.dmp

          Filesize

          272KB

        • memory/1124-79-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1124-77-0x0000000000360000-0x00000000003BB000-memory.dmp

          Filesize

          364KB

        • memory/1124-75-0x0000000000280000-0x00000000002C4000-memory.dmp

          Filesize

          272KB

        • memory/1240-66-0x0000000001C80000-0x0000000001CC4000-memory.dmp

          Filesize

          272KB

        • memory/1240-68-0x0000000001C80000-0x0000000001CC4000-memory.dmp

          Filesize

          272KB

        • memory/1240-63-0x0000000001C80000-0x0000000001CC4000-memory.dmp

          Filesize

          272KB

        • memory/1240-65-0x0000000001C80000-0x0000000001CC4000-memory.dmp

          Filesize

          272KB

        • memory/1240-67-0x0000000001C80000-0x0000000001CC4000-memory.dmp

          Filesize

          272KB

        • memory/1336-76-0x0000000001B60000-0x0000000001BA4000-memory.dmp

          Filesize

          272KB

        • memory/1336-78-0x0000000001B60000-0x0000000001BA4000-memory.dmp

          Filesize

          272KB

        • memory/1336-80-0x0000000001B60000-0x0000000001BA4000-memory.dmp

          Filesize

          272KB

        • memory/1336-74-0x0000000001B60000-0x0000000001BA4000-memory.dmp

          Filesize

          272KB

        • memory/1392-86-0x00000000025D0000-0x0000000002614000-memory.dmp

          Filesize

          272KB

        • memory/1392-85-0x00000000025D0000-0x0000000002614000-memory.dmp

          Filesize

          272KB

        • memory/1392-84-0x00000000025D0000-0x0000000002614000-memory.dmp

          Filesize

          272KB

        • memory/1392-83-0x00000000025D0000-0x0000000002614000-memory.dmp

          Filesize

          272KB

        • memory/1604-95-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1604-97-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1604-98-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1604-99-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB

        • memory/1604-105-0x0000000000050000-0x0000000000094000-memory.dmp

          Filesize

          272KB