Analysis

  • max time kernel
    152s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 14:44

General

  • Target

    b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe

  • Size

    570KB

  • MD5

    f734fb7c221da8b06a9f048f89158538

  • SHA1

    251a023d9a1d4b2a22ddb22f756fc92bd9348732

  • SHA256

    b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56

  • SHA512

    a32e4b0cb39af565e50a8ad3453b651757998ad79e1a637508b4b07420d10c86179c3cf05c6ac5f122929ad73e7514c54e3e30eed2b836bc361b0226a1700707

  • SSDEEP

    12288:YSSalsDSv+bwdr2ND2fn79tWZX1v0TpKXw8Jo0G24gw/PJf:PASGUxCDO7XsFvGoHo7Pt

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe
    "C:\Users\Admin\AppData\Local\Temp\b64bde5873c10d51ce4968bad899937de7144bede541b3fadf8d3aad996ade56.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Roaming\iexplore.exe
      C:\Users\Admin\AppData\Roaming\iexplore.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1352
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\iexplore.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\iexplore.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:1388
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 564
      2⤵
        PID:1292

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\iexplore.exe

      Filesize

      1KB

      MD5

      bab201d78c1ac0441fa840d3523a3a94

      SHA1

      fd41144091a1ed69ab0dc60010676775496543e3

      SHA256

      117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6

      SHA512

      fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b

    • C:\Users\Admin\AppData\Roaming\iexplore.exe

      Filesize

      1KB

      MD5

      bab201d78c1ac0441fa840d3523a3a94

      SHA1

      fd41144091a1ed69ab0dc60010676775496543e3

      SHA256

      117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6

      SHA512

      fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b

    • \Users\Admin\AppData\Roaming\iexplore.exe

      Filesize

      1KB

      MD5

      bab201d78c1ac0441fa840d3523a3a94

      SHA1

      fd41144091a1ed69ab0dc60010676775496543e3

      SHA256

      117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6

      SHA512

      fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b

    • \Users\Admin\AppData\Roaming\iexplore.exe

      Filesize

      1KB

      MD5

      bab201d78c1ac0441fa840d3523a3a94

      SHA1

      fd41144091a1ed69ab0dc60010676775496543e3

      SHA256

      117697d450605d92bee29e5b328044668de441f936bd7db5e12296bd043b65e6

      SHA512

      fc7d46a31b14b2464716fbc70cbd6534aab1c6412caae5fbdedecb2047b646d9e972d7378d87efb31a3ec9ec99254eb05127ccee7df4ff14087ffefdf5adec3b

    • memory/948-80-0x0000000074290000-0x000000007483B000-memory.dmp

      Filesize

      5.7MB

    • memory/948-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

      Filesize

      8KB

    • memory/948-67-0x0000000074290000-0x000000007483B000-memory.dmp

      Filesize

      5.7MB

    • memory/1516-69-0x0000000000400000-0x000000000046E000-memory.dmp

      Filesize

      440KB

    • memory/1516-62-0x00000000004E0000-0x0000000000633000-memory.dmp

      Filesize

      1.3MB

    • memory/1516-57-0x0000000000400000-0x000000000046E000-memory.dmp

      Filesize

      440KB

    • memory/1516-81-0x0000000000400000-0x000000000046E000-memory.dmp

      Filesize

      440KB