Analysis

  • max time kernel
    252s
  • max time network
    366s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 05:42

General

  • Target

    aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe

  • Size

    345KB

  • MD5

    3573ae2f0fc7906647c4d5ae40ccf5ce

  • SHA1

    3e96da3eac35005ad11a7790be33077820f4fb5b

  • SHA256

    aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4

  • SHA512

    d5e88622ab7f72b46fb4af82947c34a901975b74caa9e28913a980424fe70b2d863ed39d3e78bc9ef9267e7f637f22f331341d405587ae1eeeaeef42c3ab9d1f

  • SSDEEP

    6144:joKC4aGm1USwU9sllfoMKeUcrkqk2EmYqlVskmeHUt+J53VV/z55m+m8w:AHbwHLf9KedkoEmlzJUeFWCw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"
    1⤵
    • Drops autorun.inf file
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
      "C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe
        "C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"
        3⤵
        • Executes dropped EXE
        • Drops autorun.inf file
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe
          "C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1608
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4f175a07.bat"
        3⤵
        • Deletes itself
        PID:1084
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1168
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1116
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:336
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:644

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Autorun.inf

              Filesize

              92B

              MD5

              63419c91ea7a480ca9fead2f7036baf8

              SHA1

              137934722ca47f917a8f9a2b60d542d98548c7a5

              SHA256

              109b5b57ca94de2a38077cf30e43bfcca1eeb27f5f83c6c9305a49def9bc42d8

              SHA512

              5232ceb7083fa0f8034fc32e261201a68fd657f971c092a4321c01a0134cd6b63bfe2c885f8d9b313f4df035e3b89ac253d9b805e29e2eb4d2e0fd8fe9b09acc

            • C:\Users\Admin\AppData\Local\Temp\tmp4f175a07.bat

              Filesize

              307B

              MD5

              9b219dda1a9e02d12ca7ddfcd24f73e1

              SHA1

              91fa7fb8de0b32bbc4cdcd077c7e124251acee97

              SHA256

              d0fd09d8b2411ab6fcd49dfad88176f8ad67257ec96826e44b3f615c99be1193

              SHA512

              ec13e61917b13d0365d44ba4bf59e94ad380be825a3bed85b383214197e3b769114ab0dae56806dd1a94014f0f31e5b27321a3601d377352e380c89bbe6e5173

            • C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe

              Filesize

              345KB

              MD5

              94cad6b0ab977d47a9b98169dd57e625

              SHA1

              93c4d87c134c22b2778822f45b8dc9f943742fc8

              SHA256

              f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e

              SHA512

              81f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e

            • C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe

              Filesize

              345KB

              MD5

              94cad6b0ab977d47a9b98169dd57e625

              SHA1

              93c4d87c134c22b2778822f45b8dc9f943742fc8

              SHA256

              f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e

              SHA512

              81f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e

            • C:\Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe

              Filesize

              345KB

              MD5

              94cad6b0ab977d47a9b98169dd57e625

              SHA1

              93c4d87c134c22b2778822f45b8dc9f943742fc8

              SHA256

              f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e

              SHA512

              81f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e

            • \Users\Admin\AppData\Local\Temp\tmp1A45.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Local\Temp\tmp24F0.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Local\Temp\tmp80E.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Local\Temp\tmpF44F.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe

              Filesize

              345KB

              MD5

              94cad6b0ab977d47a9b98169dd57e625

              SHA1

              93c4d87c134c22b2778822f45b8dc9f943742fc8

              SHA256

              f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e

              SHA512

              81f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e

            • \Users\Admin\AppData\Roaming\Asruykhyqe\boadeguxuv.exe

              Filesize

              345KB

              MD5

              94cad6b0ab977d47a9b98169dd57e625

              SHA1

              93c4d87c134c22b2778822f45b8dc9f943742fc8

              SHA256

              f88dfef9fe974400857a7ffe3bd5a773dbedbdf5a04c53a2b9d8827b973c298e

              SHA512

              81f69fa5ebe838cf5cd484b178ab481aceefc5ed7791bd74728dce2ffece86f70a488b82f73c2962d4903a155b698012f7537d81144f8580475a0bd45929558e

            • memory/296-93-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-64-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-69-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-73-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-67-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-70-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-65-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-54-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-63-0x0000000075831000-0x0000000075833000-memory.dmp

              Filesize

              8KB

            • memory/296-55-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-60-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-57-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/296-58-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/336-124-0x0000000003A90000-0x0000000003AD7000-memory.dmp

              Filesize

              284KB

            • memory/336-125-0x0000000003A90000-0x0000000003AD7000-memory.dmp

              Filesize

              284KB

            • memory/336-122-0x0000000003A90000-0x0000000003AD7000-memory.dmp

              Filesize

              284KB

            • memory/336-123-0x0000000003A90000-0x0000000003AD7000-memory.dmp

              Filesize

              284KB

            • memory/644-128-0x00000000002F0000-0x0000000000337000-memory.dmp

              Filesize

              284KB

            • memory/644-129-0x00000000002F0000-0x0000000000337000-memory.dmp

              Filesize

              284KB

            • memory/644-131-0x00000000002F0000-0x0000000000337000-memory.dmp

              Filesize

              284KB

            • memory/644-130-0x00000000002F0000-0x0000000000337000-memory.dmp

              Filesize

              284KB

            • memory/1116-104-0x0000000001DA0000-0x0000000001DE7000-memory.dmp

              Filesize

              284KB

            • memory/1116-107-0x0000000001DA0000-0x0000000001DE7000-memory.dmp

              Filesize

              284KB

            • memory/1116-105-0x0000000001DA0000-0x0000000001DE7000-memory.dmp

              Filesize

              284KB

            • memory/1116-106-0x0000000001DA0000-0x0000000001DE7000-memory.dmp

              Filesize

              284KB

            • memory/1168-111-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1168-112-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1168-110-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1168-113-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1236-118-0x00000000025B0000-0x00000000025F7000-memory.dmp

              Filesize

              284KB

            • memory/1236-119-0x00000000025B0000-0x00000000025F7000-memory.dmp

              Filesize

              284KB

            • memory/1236-117-0x00000000025B0000-0x00000000025F7000-memory.dmp

              Filesize

              284KB

            • memory/1236-116-0x00000000025B0000-0x00000000025F7000-memory.dmp

              Filesize

              284KB

            • memory/1608-99-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1608-90-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB