Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 06:24

General

  • Target

    e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310.exe

  • Size

    2.5MB

  • MD5

    2bf436c8e29751577a7ca82973b45e9c

  • SHA1

    9b6d97b16a27524e73b386881a9aad1ee9955d18

  • SHA256

    e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310

  • SHA512

    54967d0f41bc67e43cc5650e5023f55f26060a1ebccd61d6fe5af296070e2c5b0dc7ccd3d933452bcedcc2e41d1c082cfb25328b3dd75638da8a261e18f777a7

  • SSDEEP

    24576:6zQdjV66pLgbCdgMiZ9YVuL/4giORHpl/Yl02S/:6zqjBpMOdYgVdgJRHjYlc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310.exe
    "C:\Users\Admin\AppData\Local\Temp\e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      PID:852
  • C:\Windows\360sd.exe
    C:\Windows\360sd.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:864

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\360sd.exe

      Filesize

      2.5MB

      MD5

      2bf436c8e29751577a7ca82973b45e9c

      SHA1

      9b6d97b16a27524e73b386881a9aad1ee9955d18

      SHA256

      e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310

      SHA512

      54967d0f41bc67e43cc5650e5023f55f26060a1ebccd61d6fe5af296070e2c5b0dc7ccd3d933452bcedcc2e41d1c082cfb25328b3dd75638da8a261e18f777a7

    • C:\Windows\360sd.exe

      Filesize

      2.5MB

      MD5

      2bf436c8e29751577a7ca82973b45e9c

      SHA1

      9b6d97b16a27524e73b386881a9aad1ee9955d18

      SHA256

      e94080f801ce123303d07086231156caa44cc9965f846912b37a0ec6e6ffc310

      SHA512

      54967d0f41bc67e43cc5650e5023f55f26060a1ebccd61d6fe5af296070e2c5b0dc7ccd3d933452bcedcc2e41d1c082cfb25328b3dd75638da8a261e18f777a7

    • C:\Windows\uninstal.bat

      Filesize

      254B

      MD5

      dfd9253468b732afd6d9ae1c4621a7d1

      SHA1

      9a2d341720fcf52d9cb19af13dd2ae760ada9b13

      SHA256

      edda057cf6cc2ea6abcfcf659bf06b5f876beae5920ace736949fd55c4543ebc

      SHA512

      137832fed81bbebd090e9c114d17588b08a5db26702300b4741443f39fd3c3b826943fe939286914efba9b33b78bc2cb9c0032e6784deefaa349fc4b6ed0f65a

    • memory/1264-59-0x0000000000400000-0x0000000000687000-memory.dmp

      Filesize

      2.5MB

    • memory/1264-62-0x0000000000400000-0x0000000000687000-memory.dmp

      Filesize

      2.5MB

    • memory/1264-64-0x0000000000400000-0x0000000000687000-memory.dmp

      Filesize

      2.5MB

    • memory/1664-54-0x0000000076181000-0x0000000076183000-memory.dmp

      Filesize

      8KB

    • memory/1664-55-0x0000000000400000-0x0000000000687000-memory.dmp

      Filesize

      2.5MB

    • memory/1664-56-0x0000000000400000-0x0000000000687000-memory.dmp

      Filesize

      2.5MB