Analysis
-
max time kernel
313s -
max time network
336s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
Resource
win10v2004-20221111-en
General
-
Target
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe
-
Size
345KB
-
MD5
3573ae2f0fc7906647c4d5ae40ccf5ce
-
SHA1
3e96da3eac35005ad11a7790be33077820f4fb5b
-
SHA256
aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4
-
SHA512
d5e88622ab7f72b46fb4af82947c34a901975b74caa9e28913a980424fe70b2d863ed39d3e78bc9ef9267e7f637f22f331341d405587ae1eeeaeef42c3ab9d1f
-
SSDEEP
6144:joKC4aGm1USwU9sllfoMKeUcrkqk2EmYqlVskmeHUt+J53VV/z55m+m8w:AHbwHLf9KedkoEmlzJUeFWCw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3256 efehqoyqana.exe -
Loads dropped DLL 2 IoCs
pid Process 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File created D:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File opened for modification D:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe File created C:\Autorun.inf aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5008 set thread context of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe Token: SeSecurityPrivilege 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 5008 wrote to memory of 4696 5008 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 83 PID 4696 wrote to memory of 3256 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 85 PID 4696 wrote to memory of 3256 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 85 PID 4696 wrote to memory of 3256 4696 aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"C:\Users\Admin\AppData\Local\Temp\aff770ca9c3f11e858d46027b5313e302bb3ebe1e970e886913f8619d2a52ee4.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Roaming\Etusweul\efehqoyqana.exe"C:\Users\Admin\AppData\Roaming\Etusweul\efehqoyqana.exe"3⤵
- Executes dropped EXE
PID:3256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
625KB
MD5eccf28d7e5ccec24119b88edd160f8f4
SHA198509587a3d37a20b56b50fd57f823a1691a034c
SHA256820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6
SHA512c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670
-
Filesize
345KB
MD56910958c3f4b0f2a452d37a26ab2b85d
SHA10e25073ef2fb14e330c036438445e0737639c9d7
SHA256f241ed328fa22539e75145f58a3b50bd99f0a59893381780590d420b9fcd3535
SHA512549558dc764ae42de0e6a3a7c2f7543fc50b1e85bdbdb158f37d049ce65618b5fef1f36c37a26c57af7da727f39e5104e31e5ff13cc70dd76a96e73414e79095
-
Filesize
345KB
MD56910958c3f4b0f2a452d37a26ab2b85d
SHA10e25073ef2fb14e330c036438445e0737639c9d7
SHA256f241ed328fa22539e75145f58a3b50bd99f0a59893381780590d420b9fcd3535
SHA512549558dc764ae42de0e6a3a7c2f7543fc50b1e85bdbdb158f37d049ce65618b5fef1f36c37a26c57af7da727f39e5104e31e5ff13cc70dd76a96e73414e79095