Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 05:50

General

  • Target

    954077d922fd090ed9d6ceb1c62bf84a99a1f8a233967075584ec3f628204be4.exe

  • Size

    81KB

  • MD5

    41fc66d0c54325a6ec0d302ed3de3eb6

  • SHA1

    82ba4587f013c06733a388fddc27a97c5c733ab8

  • SHA256

    954077d922fd090ed9d6ceb1c62bf84a99a1f8a233967075584ec3f628204be4

  • SHA512

    b496084754227af352483416ea47c28e2003238d6cd3947c55060fa6a4446de89f4d72f5fcc28decf1c4865ea1976f7051a517d9aa9a2a6c03eea0d40e795daa

  • SSDEEP

    768:2rFPx8ceViHNaZyiJHFlnjSSO3c1boD9d9rA49U6n1hPLJ890GMkJ5z9o6je4K6h:2ByKNaZXWYEi4K6nPMbLRoMe4K2f1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\954077d922fd090ed9d6ceb1c62bf84a99a1f8a233967075584ec3f628204be4.exe
    "C:\Users\Admin\AppData\Local\Temp\954077d922fd090ed9d6ceb1c62bf84a99a1f8a233967075584ec3f628204be4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\ProgramData\DownloadSave\mhfmaby.exe
      "C:\ProgramData\DownloadSave\mhfmaby.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\ProgramData\DownloadSave\ mhfmaby.exe
        "C:\ProgramData\DownloadSave\ mhfmaby.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DownloadSave\ mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • C:\ProgramData\DownloadSave\RecordPath

    Filesize

    260B

    MD5

    f4173d6266645371f20f1950317e44db

    SHA1

    9f92bc6f97c083cd8661c340da63414346d3fc5e

    SHA256

    9cd80b5fb7b48b4c94b09837923a2ae0f29c00cab3d2036d0e48de9f2b324ccb

    SHA512

    56f285d81f155259960f96ce9694d28a539279281ae1030e5f195a1b3a48d5945a7946395edf7b2d0333e08efce4b1479581a9fd910af90b0a9add1bcb940214

  • C:\ProgramData\DownloadSave\mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • C:\ProgramData\DownloadSave\mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • \ProgramData\DownloadSave\ mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • \ProgramData\DownloadSave\ mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • \ProgramData\DownloadSave\mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • \ProgramData\DownloadSave\mhfmaby.exe

    Filesize

    6.1MB

    MD5

    ac7a5892f9775d7f9465a80777d53709

    SHA1

    7e95a54defff27b3cc363d53276c723ecee25833

    SHA256

    e43379f38431c5b678a2834ff2d520a30f88e03b7c2d44c6bf185fd6f702adf7

    SHA512

    a09eeb1751e288dc1d4d221e9c24e04301d0d85fe0cc462044487fd78ddfd53af224104137d3f369a1c4e5fed714ffec930e81966c6ced78814922e4305964cb

  • memory/2044-54-0x0000000075F81000-0x0000000075F83000-memory.dmp

    Filesize

    8KB