Analysis

  • max time kernel
    188s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 05:34

General

  • Target

    8e709be93c448d1957e00181a85cf244440d3bafb0cebd0788c271ae0cca3cff.exe

  • Size

    881KB

  • MD5

    60d86ba8cb1ad3d45452d64d11c7ce24

  • SHA1

    398f6f367f73ed358dd13174e1d1fefdadb6fb9c

  • SHA256

    8e709be93c448d1957e00181a85cf244440d3bafb0cebd0788c271ae0cca3cff

  • SHA512

    eecf92092057ed3569ca15763ee31129b68ea5efdfd5acaaff88d5560527bdd57c69c928ff86a14171e19d928c58b9448aa6e92034665033381e83992a9d1dba

  • SSDEEP

    24576:xgveG+HFLpv1crnz4N2iN8bCBuP/2PjKzg5:AeG+HFL04N/8b5P+PjAO

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • VMProtect packed file 20 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e709be93c448d1957e00181a85cf244440d3bafb0cebd0788c271ae0cca3cff.exe
    "C:\Users\Admin\AppData\Local\Temp\8e709be93c448d1957e00181a85cf244440d3bafb0cebd0788c271ae0cca3cff.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            PID:284
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1644

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe

            Filesize

            744KB

            MD5

            8052bc30a355e2a939772bcbaa416c1f

            SHA1

            0083d602dc9bc8cd2ba9f84f5c2454bbf1e52796

            SHA256

            9047ce6996966fefddf0f8c014a4144285ef7afa0a3b31e1bd9945397343f92e

            SHA512

            9b6095fb8351d6f9024bde439bce0358cacc7c3364778c544b8462c0c2bb51b623a021c6cb375b6236247ea5ec2144bbb92e11406ce47385e310af1117647830

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe

            Filesize

            744KB

            MD5

            8052bc30a355e2a939772bcbaa416c1f

            SHA1

            0083d602dc9bc8cd2ba9f84f5c2454bbf1e52796

            SHA256

            9047ce6996966fefddf0f8c014a4144285ef7afa0a3b31e1bd9945397343f92e

            SHA512

            9b6095fb8351d6f9024bde439bce0358cacc7c3364778c544b8462c0c2bb51b623a021c6cb375b6236247ea5ec2144bbb92e11406ce47385e310af1117647830

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE

            Filesize

            449KB

            MD5

            1c3a5b4e4b3817741d63f8bb59423d2f

            SHA1

            1b34a7f82fdcc7b56dafa6a4486fed15424d18eb

            SHA256

            2d2a99923185243556e6598ee57f198439ba23ae328686a30ca3b49e8c693799

            SHA512

            ffa2386e43073e99dd6a8c8cd19ea6405ef8ab7c72acdbcb94ac127067a61cb7f31b7ec3dde2d3e8da858434ff20c91ae78de04f0ca55ec1588dce3a12d07070

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE

            Filesize

            449KB

            MD5

            1c3a5b4e4b3817741d63f8bb59423d2f

            SHA1

            1b34a7f82fdcc7b56dafa6a4486fed15424d18eb

            SHA256

            2d2a99923185243556e6598ee57f198439ba23ae328686a30ca3b49e8c693799

            SHA512

            ffa2386e43073e99dd6a8c8cd19ea6405ef8ab7c72acdbcb94ac127067a61cb7f31b7ec3dde2d3e8da858434ff20c91ae78de04f0ca55ec1588dce3a12d07070

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE

            Filesize

            356KB

            MD5

            245808a1bffb095ba4633c02096e2b0d

            SHA1

            3554cd8a10b9b170fe0544894b9d1e606a1d292e

            SHA256

            cf11f2c53dcadb432b72926dd3c2eb2ca0c6bd35a02617563a68f9faa25085bc

            SHA512

            3ae2c46b24adb01ff8dec1896f020370c4eed0109666f0c1a64384f43081e4d2edd9784a8350c03bbef15faf96662af7dceac0bf131ffd66fe583e83ae687142

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE

            Filesize

            356KB

            MD5

            245808a1bffb095ba4633c02096e2b0d

            SHA1

            3554cd8a10b9b170fe0544894b9d1e606a1d292e

            SHA256

            cf11f2c53dcadb432b72926dd3c2eb2ca0c6bd35a02617563a68f9faa25085bc

            SHA512

            3ae2c46b24adb01ff8dec1896f020370c4eed0109666f0c1a64384f43081e4d2edd9784a8350c03bbef15faf96662af7dceac0bf131ffd66fe583e83ae687142

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • C:\Windows\Hacker.com.cn.exe

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • C:\Windows\Hacker.com.cn.exe

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe

            Filesize

            744KB

            MD5

            8052bc30a355e2a939772bcbaa416c1f

            SHA1

            0083d602dc9bc8cd2ba9f84f5c2454bbf1e52796

            SHA256

            9047ce6996966fefddf0f8c014a4144285ef7afa0a3b31e1bd9945397343f92e

            SHA512

            9b6095fb8351d6f9024bde439bce0358cacc7c3364778c544b8462c0c2bb51b623a021c6cb375b6236247ea5ec2144bbb92e11406ce47385e310af1117647830

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe

            Filesize

            744KB

            MD5

            8052bc30a355e2a939772bcbaa416c1f

            SHA1

            0083d602dc9bc8cd2ba9f84f5c2454bbf1e52796

            SHA256

            9047ce6996966fefddf0f8c014a4144285ef7afa0a3b31e1bd9945397343f92e

            SHA512

            9b6095fb8351d6f9024bde439bce0358cacc7c3364778c544b8462c0c2bb51b623a021c6cb375b6236247ea5ec2144bbb92e11406ce47385e310af1117647830

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\123.exe

            Filesize

            744KB

            MD5

            8052bc30a355e2a939772bcbaa416c1f

            SHA1

            0083d602dc9bc8cd2ba9f84f5c2454bbf1e52796

            SHA256

            9047ce6996966fefddf0f8c014a4144285ef7afa0a3b31e1bd9945397343f92e

            SHA512

            9b6095fb8351d6f9024bde439bce0358cacc7c3364778c544b8462c0c2bb51b623a021c6cb375b6236247ea5ec2144bbb92e11406ce47385e310af1117647830

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE

            Filesize

            449KB

            MD5

            1c3a5b4e4b3817741d63f8bb59423d2f

            SHA1

            1b34a7f82fdcc7b56dafa6a4486fed15424d18eb

            SHA256

            2d2a99923185243556e6598ee57f198439ba23ae328686a30ca3b49e8c693799

            SHA512

            ffa2386e43073e99dd6a8c8cd19ea6405ef8ab7c72acdbcb94ac127067a61cb7f31b7ec3dde2d3e8da858434ff20c91ae78de04f0ca55ec1588dce3a12d07070

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE

            Filesize

            449KB

            MD5

            1c3a5b4e4b3817741d63f8bb59423d2f

            SHA1

            1b34a7f82fdcc7b56dafa6a4486fed15424d18eb

            SHA256

            2d2a99923185243556e6598ee57f198439ba23ae328686a30ca3b49e8c693799

            SHA512

            ffa2386e43073e99dd6a8c8cd19ea6405ef8ab7c72acdbcb94ac127067a61cb7f31b7ec3dde2d3e8da858434ff20c91ae78de04f0ca55ec1588dce3a12d07070

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\2VMP~1.EXE

            Filesize

            449KB

            MD5

            1c3a5b4e4b3817741d63f8bb59423d2f

            SHA1

            1b34a7f82fdcc7b56dafa6a4486fed15424d18eb

            SHA256

            2d2a99923185243556e6598ee57f198439ba23ae328686a30ca3b49e8c693799

            SHA512

            ffa2386e43073e99dd6a8c8cd19ea6405ef8ab7c72acdbcb94ac127067a61cb7f31b7ec3dde2d3e8da858434ff20c91ae78de04f0ca55ec1588dce3a12d07070

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE

            Filesize

            356KB

            MD5

            245808a1bffb095ba4633c02096e2b0d

            SHA1

            3554cd8a10b9b170fe0544894b9d1e606a1d292e

            SHA256

            cf11f2c53dcadb432b72926dd3c2eb2ca0c6bd35a02617563a68f9faa25085bc

            SHA512

            3ae2c46b24adb01ff8dec1896f020370c4eed0109666f0c1a64384f43081e4d2edd9784a8350c03bbef15faf96662af7dceac0bf131ffd66fe583e83ae687142

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE

            Filesize

            356KB

            MD5

            245808a1bffb095ba4633c02096e2b0d

            SHA1

            3554cd8a10b9b170fe0544894b9d1e606a1d292e

            SHA256

            cf11f2c53dcadb432b72926dd3c2eb2ca0c6bd35a02617563a68f9faa25085bc

            SHA512

            3ae2c46b24adb01ff8dec1896f020370c4eed0109666f0c1a64384f43081e4d2edd9784a8350c03bbef15faf96662af7dceac0bf131ffd66fe583e83ae687142

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\1VMP~1.EXE

            Filesize

            356KB

            MD5

            245808a1bffb095ba4633c02096e2b0d

            SHA1

            3554cd8a10b9b170fe0544894b9d1e606a1d292e

            SHA256

            cf11f2c53dcadb432b72926dd3c2eb2ca0c6bd35a02617563a68f9faa25085bc

            SHA512

            3ae2c46b24adb01ff8dec1896f020370c4eed0109666f0c1a64384f43081e4d2edd9784a8350c03bbef15faf96662af7dceac0bf131ffd66fe583e83ae687142

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\SERVER~1.EXE

            Filesize

            270KB

            MD5

            00de71cc98d67643b0b083e0dc682221

            SHA1

            b0cf87b72552d7eb502efb1c074044d3ad914799

            SHA256

            d2cc4b9e802d012c9eead32c669a4b7a8f8cd5d8b9fcbbf6f4065acf24b3c80d

            SHA512

            19c0a30b1ce6a80a66737eebd5eb312dbf5fbf96182013ba045bc7deaa838c04280e65c58caeee24e5ca454f03d5ab82ca3217ed8b8afa5f3364a62918b6943d

          • memory/284-99-0x0000000000400000-0x000000000050A000-memory.dmp

            Filesize

            1.0MB

          • memory/284-97-0x0000000000400000-0x000000000050A000-memory.dmp

            Filesize

            1.0MB

          • memory/284-110-0x00000000002B0000-0x00000000002B3000-memory.dmp

            Filesize

            12KB

          • memory/576-85-0x0000000002F10000-0x0000000002FEB000-memory.dmp

            Filesize

            876KB

          • memory/576-114-0x0000000000860000-0x00000000008B0000-memory.dmp

            Filesize

            320KB

          • memory/576-84-0x0000000002B20000-0x0000000002B23000-memory.dmp

            Filesize

            12KB

          • memory/576-82-0x0000000001000000-0x00000000010C6000-memory.dmp

            Filesize

            792KB

          • memory/576-113-0x0000000001000000-0x00000000010C6000-memory.dmp

            Filesize

            792KB

          • memory/576-83-0x0000000000860000-0x00000000008B0000-memory.dmp

            Filesize

            320KB

          • memory/652-87-0x0000000000900000-0x00000000009AF000-memory.dmp

            Filesize

            700KB

          • memory/652-112-0x0000000001000000-0x00000000010DB000-memory.dmp

            Filesize

            876KB

          • memory/652-86-0x0000000001000000-0x00000000010DB000-memory.dmp

            Filesize

            876KB

          • memory/652-103-0x0000000000900000-0x00000000009AF000-memory.dmp

            Filesize

            700KB

          • memory/652-102-0x0000000000900000-0x00000000009AF000-memory.dmp

            Filesize

            700KB

          • memory/652-71-0x0000000001000000-0x00000000010DB000-memory.dmp

            Filesize

            876KB

          • memory/1060-108-0x0000000000400000-0x000000000050A000-memory.dmp

            Filesize

            1.0MB

          • memory/1060-107-0x0000000000400000-0x000000000050A000-memory.dmp

            Filesize

            1.0MB

          • memory/1060-116-0x0000000000400000-0x000000000050A000-memory.dmp

            Filesize

            1.0MB

          • memory/1136-80-0x0000000001000000-0x00000000010AF000-memory.dmp

            Filesize

            700KB

          • memory/1136-98-0x00000000007F0000-0x00000000008FA000-memory.dmp

            Filesize

            1.0MB

          • memory/1136-104-0x00000000007F0000-0x00000000008FA000-memory.dmp

            Filesize

            1.0MB

          • memory/1136-89-0x0000000000170000-0x000000000021F000-memory.dmp

            Filesize

            700KB

          • memory/1136-88-0x0000000001000000-0x00000000010AF000-memory.dmp

            Filesize

            700KB

          • memory/1136-111-0x0000000001000000-0x00000000010AF000-memory.dmp

            Filesize

            700KB

          • memory/1332-56-0x0000000001000000-0x00000000011A9000-memory.dmp

            Filesize

            1.7MB

          • memory/1332-55-0x0000000001000000-0x00000000011A9000-memory.dmp

            Filesize

            1.7MB

          • memory/1332-101-0x0000000000760000-0x0000000000909000-memory.dmp

            Filesize

            1.7MB

          • memory/1332-81-0x0000000000940000-0x0000000000A06000-memory.dmp

            Filesize

            792KB

          • memory/1332-79-0x0000000000760000-0x0000000000909000-memory.dmp

            Filesize

            1.7MB

          • memory/1332-54-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

            Filesize

            8KB

          • memory/1332-115-0x0000000001000000-0x00000000011A9000-memory.dmp

            Filesize

            1.7MB

          • memory/1332-100-0x0000000001000000-0x00000000011A9000-memory.dmp

            Filesize

            1.7MB