Analysis

  • max time kernel
    128s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 17:58

General

  • Target

    c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe

  • Size

    361KB

  • MD5

    81d45f924f9d173b52de24dfe4ef3612

  • SHA1

    2837e9dc2edff7dd1c8f48d8be2614470e86eb14

  • SHA256

    c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2

  • SHA512

    ca5163c305104bd586e1ebf16b7c6ffb2235f12fd2fa3a1bb6c8c8d26998a9caaf67ee34d440901b7b15283bde07293323742807c0d00d061898641254090ae7

  • SSDEEP

    6144:7flfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:7flfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe
    "C:\Users\Admin\AppData\Local\Temp\c813d9417d6a5e0f05d0c7eeb040a7112037706702c0b76bba2a99932e1067b2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Temp\uqlkytpkjesomidz.exe
      C:\Temp\uqlkytpkjesomidz.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\pmicyvsoiw.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:756
        • C:\Temp\pmicyvsoiw.exe
          C:\Temp\pmicyvsoiw.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1352
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1772
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1776

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • C:\Temp\pmicyvsoiw.exe

          Filesize

          361KB

          MD5

          7212e8bc282f1c525c218d954977cd77

          SHA1

          66b3f15ef811e1f993455b8db151981742747d65

          SHA256

          b283fe071de412ebbcb08018acccc5e6e2103708363dfd6fd85af071c97c6a25

          SHA512

          d65db2a0f7fb32665d64eb56cc1ad20e4346aa56673634ac820ebcb756d146ec60ac54371fde6b078a6a1dc324bcdbaad6d897f36ef2e12b35fd983c74e304db

        • C:\Temp\uqlkytpkjesomidz.exe

          Filesize

          361KB

          MD5

          fdffc75ca5c6e655d9752f896eea575c

          SHA1

          c30a30effd79784ba9f74309823f5e379a2f7b15

          SHA256

          ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5

          SHA512

          5622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96

        • C:\Temp\uqlkytpkjesomidz.exe

          Filesize

          361KB

          MD5

          fdffc75ca5c6e655d9752f896eea575c

          SHA1

          c30a30effd79784ba9f74309823f5e379a2f7b15

          SHA256

          ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5

          SHA512

          5622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YYEN58QZ.txt

          Filesize

          606B

          MD5

          113eb6f71a23d5f53c6b86995af9e3c0

          SHA1

          ed8a947e23d6dbaf22ebc8d66fa1956a916378ab

          SHA256

          f5b728ee13346f6c92ce8706d24f6fd8c62fd531156dd46442b4864ff425f169

          SHA512

          04e0b919d48b3b7ebdb424b72b7de2ad8730d71c2d86db2575d40ab30efc5524e8d49339b85acbce2af818a107ccf9533b2bbabd83e68e54f3831d1b0e3338ce

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          73e5f7043242fe21c9dcd6027b796458

          SHA1

          7d04f78ed942c7f41bc1b6fd33dca651c18f70b4

          SHA256

          283a68e6a5bbf665d9cde598728358972e51de9651f4ad79c2ead0e45aa2de9a

          SHA512

          67d9293c727a9261a4fb5d24745ebfef284a7446383d893cbfd08b14f6b885078d09ad2afdbd51e8a36632e7d9ecc47a55fd2d924f0d3a232bdabc486738f89a

        • \Temp\uqlkytpkjesomidz.exe

          Filesize

          361KB

          MD5

          fdffc75ca5c6e655d9752f896eea575c

          SHA1

          c30a30effd79784ba9f74309823f5e379a2f7b15

          SHA256

          ebabe90b9a98aa8c703833e650606f602ad9d7e7fef4a6bfaef62ea08a6de4e5

          SHA512

          5622cce1fec805e4c45a4200591d0bb79a693722824b3c765309a62dc706d9c9e9fe43869f555c4b2fa366ce9158d1675044c3a74b6dbe6c6b36de1f77ba7a96