Analysis

  • max time kernel
    151s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 12:56

General

  • Target

    ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe

  • Size

    260KB

  • MD5

    d597f11a6a547a91b4bdbadf478792d6

  • SHA1

    8b14288ce560c836429f4254ccc3ce09857d326d

  • SHA256

    ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f

  • SHA512

    cbe3613fc966e8293e343ed058ba4a1056af38b2607f8a143a18ed4e6c4fae2e0bee8bea46f5ecb2855142742bb3c1a77ff25dd251475368ae411bf203204698

  • SSDEEP

    6144:VTqCiHK2Eod+x7tGA70u/sifnAj8EoO1tA3w9:5oqc+tGA7v/siImO17

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe
        "C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe
          "C:\Users\Admin\AppData\Local\Temp\ccf5bc06ef52229331375d0a89707598920c23069634085cbdab300c9de5941f.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe
            "C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1648
            • C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe
              "C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1692
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8b4c6837.bat"
            4⤵
            • Deletes itself
            PID:268
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1232
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1136
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1388
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:824
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1380
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1696

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmp8b4c6837.bat

                  Filesize

                  307B

                  MD5

                  283ea5143d32c542e5eae4075f8a12b3

                  SHA1

                  82153cf177ea08533c8578e4ac616dffad047de1

                  SHA256

                  5750c0215dab2ce6694eebfd746ea9e06d630faddedd50df6672957dd0c802c7

                  SHA512

                  60271f3219748607e757a923faa8194e8ba4af2aa58feba8fded8e3b45c1149a1507f9000cb831932543384986105c1d6113dfdd589238a79a7f57fa69ceb887

                • C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe

                  Filesize

                  260KB

                  MD5

                  dc7ae529628cf79d82721277d1008e55

                  SHA1

                  22a8449887e10da6e9872a5ca2f041b74920808b

                  SHA256

                  edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25

                  SHA512

                  3a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be

                • C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe

                  Filesize

                  260KB

                  MD5

                  dc7ae529628cf79d82721277d1008e55

                  SHA1

                  22a8449887e10da6e9872a5ca2f041b74920808b

                  SHA256

                  edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25

                  SHA512

                  3a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be

                • C:\Users\Admin\AppData\Roaming\Cewuag\ygevi.exe

                  Filesize

                  260KB

                  MD5

                  dc7ae529628cf79d82721277d1008e55

                  SHA1

                  22a8449887e10da6e9872a5ca2f041b74920808b

                  SHA256

                  edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25

                  SHA512

                  3a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be

                • \Users\Admin\AppData\Roaming\Cewuag\ygevi.exe

                  Filesize

                  260KB

                  MD5

                  dc7ae529628cf79d82721277d1008e55

                  SHA1

                  22a8449887e10da6e9872a5ca2f041b74920808b

                  SHA256

                  edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25

                  SHA512

                  3a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be

                • \Users\Admin\AppData\Roaming\Cewuag\ygevi.exe

                  Filesize

                  260KB

                  MD5

                  dc7ae529628cf79d82721277d1008e55

                  SHA1

                  22a8449887e10da6e9872a5ca2f041b74920808b

                  SHA256

                  edbef1546bf722ddb4cfec3592afa4fdc416cd7380cdc56021c009c3632cbe25

                  SHA512

                  3a4ddabddecfc7ee1bcb2986ea212ebaf948f406123dbb83bcbf522ece15f23fe2ff9bd29b5595163742a784c3f395499499d49299024e4c3357420e698125be

                • memory/268-84-0x0000000000000000-mapping.dmp

                • memory/824-114-0x00000000000F0000-0x0000000000129000-memory.dmp

                  Filesize

                  228KB

                • memory/824-116-0x00000000000F0000-0x0000000000129000-memory.dmp

                  Filesize

                  228KB

                • memory/824-117-0x00000000000F0000-0x0000000000129000-memory.dmp

                  Filesize

                  228KB

                • memory/824-115-0x00000000000F0000-0x0000000000129000-memory.dmp

                  Filesize

                  228KB

                • memory/1136-87-0x0000000001ED0000-0x0000000001F09000-memory.dmp

                  Filesize

                  228KB

                • memory/1136-88-0x0000000001ED0000-0x0000000001F09000-memory.dmp

                  Filesize

                  228KB

                • memory/1136-89-0x0000000001ED0000-0x0000000001F09000-memory.dmp

                  Filesize

                  228KB

                • memory/1136-91-0x0000000001ED0000-0x0000000001F09000-memory.dmp

                  Filesize

                  228KB

                • memory/1232-98-0x00000000001D0000-0x0000000000209000-memory.dmp

                  Filesize

                  228KB

                • memory/1232-94-0x00000000001D0000-0x0000000000209000-memory.dmp

                  Filesize

                  228KB

                • memory/1232-95-0x00000000001D0000-0x0000000000209000-memory.dmp

                  Filesize

                  228KB

                • memory/1232-97-0x00000000001D0000-0x0000000000209000-memory.dmp

                  Filesize

                  228KB

                • memory/1268-102-0x00000000029C0000-0x00000000029F9000-memory.dmp

                  Filesize

                  228KB

                • memory/1268-101-0x00000000029C0000-0x00000000029F9000-memory.dmp

                  Filesize

                  228KB

                • memory/1268-104-0x00000000029C0000-0x00000000029F9000-memory.dmp

                  Filesize

                  228KB

                • memory/1268-103-0x00000000029C0000-0x00000000029F9000-memory.dmp

                  Filesize

                  228KB

                • memory/1380-123-0x0000000001B80000-0x0000000001BB9000-memory.dmp

                  Filesize

                  228KB

                • memory/1380-122-0x0000000001B80000-0x0000000001BB9000-memory.dmp

                  Filesize

                  228KB

                • memory/1380-121-0x0000000001B80000-0x0000000001BB9000-memory.dmp

                  Filesize

                  228KB

                • memory/1380-120-0x0000000001B80000-0x0000000001BB9000-memory.dmp

                  Filesize

                  228KB

                • memory/1388-108-0x0000000003B60000-0x0000000003B99000-memory.dmp

                  Filesize

                  228KB

                • memory/1388-109-0x0000000003B60000-0x0000000003B99000-memory.dmp

                  Filesize

                  228KB

                • memory/1388-111-0x0000000003B60000-0x0000000003B99000-memory.dmp

                  Filesize

                  228KB

                • memory/1388-110-0x0000000003B60000-0x0000000003B99000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-56-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-65-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-90-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-62-0x0000000000432055-mapping.dmp

                • memory/1608-71-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-59-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-58-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-61-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1608-55-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1648-68-0x0000000000000000-mapping.dmp

                • memory/1692-80-0x0000000000432055-mapping.dmp

                • memory/1692-105-0x0000000000400000-0x0000000000439000-memory.dmp

                  Filesize

                  228KB

                • memory/1696-126-0x0000000000220000-0x0000000000259000-memory.dmp

                  Filesize

                  228KB

                • memory/1696-127-0x0000000000220000-0x0000000000259000-memory.dmp

                  Filesize

                  228KB

                • memory/1696-128-0x0000000000220000-0x0000000000259000-memory.dmp

                  Filesize

                  228KB

                • memory/1696-129-0x0000000000220000-0x0000000000259000-memory.dmp

                  Filesize

                  228KB

                • memory/2032-54-0x0000000075201000-0x0000000075203000-memory.dmp

                  Filesize

                  8KB