Analysis

  • max time kernel
    206s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 11:07

General

  • Target

    f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe

  • Size

    288KB

  • MD5

    78295195ce50c917ecdfa4e49b108d67

  • SHA1

    c679bb9be1f010f8f5f4dcfb4c420b184827caad

  • SHA256

    f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550

  • SHA512

    42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206

  • SSDEEP

    6144:hwTiB0lUhepAxq/0Ta+8/iNoC8r6axpu4+pVRo8X1e:hwTiB0uepGq/kwiWvuxVRo8le

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe
    "C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\txq.exe
      "C:\Users\Admin\AppData\Local\txq.exe" -gav C:\Users\Admin\AppData\Local\Temp\f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Deletes itself
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2016
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:772
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\txq.exe

          Filesize

          288KB

          MD5

          78295195ce50c917ecdfa4e49b108d67

          SHA1

          c679bb9be1f010f8f5f4dcfb4c420b184827caad

          SHA256

          f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550

          SHA512

          42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206

        • C:\Users\Admin\AppData\Local\txq.exe

          Filesize

          288KB

          MD5

          78295195ce50c917ecdfa4e49b108d67

          SHA1

          c679bb9be1f010f8f5f4dcfb4c420b184827caad

          SHA256

          f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550

          SHA512

          42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206

        • \Users\Admin\AppData\Local\txq.exe

          Filesize

          288KB

          MD5

          78295195ce50c917ecdfa4e49b108d67

          SHA1

          c679bb9be1f010f8f5f4dcfb4c420b184827caad

          SHA256

          f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550

          SHA512

          42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206

        • \Users\Admin\AppData\Local\txq.exe

          Filesize

          288KB

          MD5

          78295195ce50c917ecdfa4e49b108d67

          SHA1

          c679bb9be1f010f8f5f4dcfb4c420b184827caad

          SHA256

          f71fa445b16942b62839f5ccb47a9c6624af5f318a8e7581e87ffe9326cee550

          SHA512

          42fc7bcaef2e94bb2f84946f0f4dd9dbb029d5de5ca6ff92705f16c00be43c756cd79e062bd38c065a80ecb52af033d4fb1a752ab44d56b23980b8d5c3edd206

        • memory/772-68-0x000007FEFBE61000-0x000007FEFBE63000-memory.dmp

          Filesize

          8KB

        • memory/1372-58-0x0000000002160000-0x0000000002417000-memory.dmp

          Filesize

          2.7MB

        • memory/1372-54-0x0000000076041000-0x0000000076043000-memory.dmp

          Filesize

          8KB

        • memory/1372-57-0x0000000000020000-0x0000000000025000-memory.dmp

          Filesize

          20KB

        • memory/1372-63-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/1372-56-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/1372-55-0x0000000000230000-0x0000000000239000-memory.dmp

          Filesize

          36KB

        • memory/2016-66-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2016-67-0x0000000000230000-0x0000000000235000-memory.dmp

          Filesize

          20KB

        • memory/2016-69-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2016-70-0x0000000074881000-0x0000000074883000-memory.dmp

          Filesize

          8KB