Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 20:17

General

  • Target

    e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe

  • Size

    68KB

  • MD5

    8919abf027ab3e64688b31f4a9af108a

  • SHA1

    b9bdf54829fdca2a880fb3c59b7dc1d7fcd1c647

  • SHA256

    e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb

  • SHA512

    562443d9332b4035b9de5ebc6f96783f7fa107a73b3d7149cd36b89129f125962ce6d46be5b0d3ea54cc6532771cf6f294e83c0f6cbd0c1a35069a7262a98e2c

  • SSDEEP

    1536:/nZWzIhrpZFHpOe+btSeZz74FDeBIZ8x+l+KC:xWzIhrbqXWKBIZ8t

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
    "C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\reg.exe
      reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t REG_SZ /d msaom32.drv /f
      2⤵
        PID:1948
      • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
        C:\Users\Admin\AppData\Local\Temp\servicesc.exe e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
          C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
          3⤵
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t REG_SZ /d msaom32.drv /f
            4⤵
              PID:1104
            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
              C:\Users\Admin\AppData\Local\Temp\servicesc.exe e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1848
          • C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
            C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
            3⤵
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:920
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t REG_SZ /d msaom32.drv /f
              4⤵
                PID:1596
              • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
                C:\Users\Admin\AppData\Local\Temp\servicesc.exe e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1600
            • C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
              C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
              3⤵
              • Loads dropped DLL
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1268
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t REG_SZ /d msaom32.drv /f
                4⤵
                  PID:1960
                • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
                  C:\Users\Admin\AppData\Local\Temp\servicesc.exe e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1780
              • C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
                C:\Users\Admin\AppData\Local\Temp\e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
                3⤵
                • Loads dropped DLL
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:288
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t REG_SZ /d msaom32.drv /f
                  4⤵
                    PID:1576
                  • C:\Users\Admin\AppData\Local\Temp\servicesc.exe
                    C:\Users\Admin\AppData\Local\Temp\servicesc.exe e311ed3132bcf56ba3c4b7d158b20eeaaa3563b1e045b027690d6dc81339bdcb.exe
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:584

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • C:\Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • \Users\Admin\AppData\Local\Temp\servicesc.exe

              Filesize

              28KB

              MD5

              d5e5cf7d25a9efd10833ebdf2e18048f

              SHA1

              a05c3eb3ba2426f0c3c4e8f7fd9fa5f2c75ed91b

              SHA256

              1a965dc6a9768bb9ffce3cca6dd79ac93d9fe30dd3a8208f9f369fa99d809bd7

              SHA512

              ba4bf57291b94bc0faa6b796bc0a5446afceab324fca9136124e2f2be58ee754fbe61240409bfd423e7c0939edb7587a6d43d36c83c6a9375a2f8f2eff223708

            • memory/320-80-0x0000000003691000-0x000000000453D000-memory.dmp

              Filesize

              14.7MB

            • memory/1268-108-0x0000000003631000-0x00000000044DD000-memory.dmp

              Filesize

              14.7MB

            • memory/1908-56-0x00000000762F1000-0x00000000762F3000-memory.dmp

              Filesize

              8KB