Analysis

  • max time kernel
    173s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 13:10

General

  • Target

    ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe

  • Size

    92KB

  • MD5

    d173fa568e03d8fe35a36d72e5028cc5

  • SHA1

    aa98a12bc226f79a3e3eebda3461c225434afe70

  • SHA256

    ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89

  • SHA512

    986f575eb94407df4795d554ebab460220c47e05a031435cf6b1d3cfd79ca6cb54904716bb2b6c9d5e336f9b35fa29a13a66f2ca32eb98c0320bfab10c5e3dd5

  • SSDEEP

    1536:/a0kJO8PwA5DPNRUiRrVthIeqQJcRebXKvDNALKbR1XVOH:S9pfU0VthPqQJkebToXVOH

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe
    "C:\Users\Admin\AppData\Local\Temp\ecef06cce43e352b38f6375ec8395094111e985ff075071dba456f43f32ddb89.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp
      "C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp"
      2⤵
      • Executes dropped EXE
      PID:4188
    • C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp
      "C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp"
      2⤵
      • Executes dropped EXE
      PID:4668
    • C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp
      "C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp"
      2⤵
      • Executes dropped EXE
      PID:3584
    • C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp
      "C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp"
      2⤵
      • Executes dropped EXE
      PID:5060
    • C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp
      "C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp"
      2⤵
      • Executes dropped EXE
      PID:4436
    • C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp
      "C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp"
      2⤵
      • Executes dropped EXE
      PID:1844
    • C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp
      "C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp"
      2⤵
      • Executes dropped EXE
      PID:1384
    • C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp
      "C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp"
      2⤵
      • Executes dropped EXE
      PID:1668

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp

          Filesize

          66KB

          MD5

          ffbd7036c1d415db0b12734d7ab3deda

          SHA1

          a98a8f1c2695ecdf4e1948516525e17f739bca14

          SHA256

          4b8a06ebd542abc1b75a1b8cb68dc561013f22b6af44e9fc292668d80ce41664

          SHA512

          d18519a25ed24cc8122f51dbc90141f2fc749c43cab37055d2573ca548b2dffc874f4abd9383e35ce875270823a0d83d8dd1a202fe82b4b7a1cc345fcbbb387d

        • C:\Users\Admin\AppData\Local\Temp\~1cb0bb76.tmp

          Filesize

          66KB

          MD5

          ffbd7036c1d415db0b12734d7ab3deda

          SHA1

          a98a8f1c2695ecdf4e1948516525e17f739bca14

          SHA256

          4b8a06ebd542abc1b75a1b8cb68dc561013f22b6af44e9fc292668d80ce41664

          SHA512

          d18519a25ed24cc8122f51dbc90141f2fc749c43cab37055d2573ca548b2dffc874f4abd9383e35ce875270823a0d83d8dd1a202fe82b4b7a1cc345fcbbb387d

        • C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp

          Filesize

          66KB

          MD5

          e566b19369db78945fc075a359a4d164

          SHA1

          3aac0db20129774bda566176e7a29c7893908d57

          SHA256

          c0e9cce2a6b87cba6efe975872e3ec59e8ede20c93e84086500b457bc2936e2b

          SHA512

          b63a9ce3703e28ff7fa90c296b5c62c388a063a8638cf17e26b8952be47ec3e3974d93d92ebb15087f4251d85ccc12e81e85f9d90044c05925a7956fbcb4d77b

        • C:\Users\Admin\AppData\Local\Temp\~3962ef24.tmp

          Filesize

          66KB

          MD5

          e566b19369db78945fc075a359a4d164

          SHA1

          3aac0db20129774bda566176e7a29c7893908d57

          SHA256

          c0e9cce2a6b87cba6efe975872e3ec59e8ede20c93e84086500b457bc2936e2b

          SHA512

          b63a9ce3703e28ff7fa90c296b5c62c388a063a8638cf17e26b8952be47ec3e3974d93d92ebb15087f4251d85ccc12e81e85f9d90044c05925a7956fbcb4d77b

        • C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp

          Filesize

          66KB

          MD5

          7d811bd4f3d9a36681d29a9bf434886f

          SHA1

          05fc70947d24d41992d7625dc7838f71751ae678

          SHA256

          99c40abca1952e7f96f1643f991d2d4633902affebc724951ab5a00995f10b38

          SHA512

          a77354c171a53f103d9a28ce96849edbfc1704a7474520accbcdd4f42a8a5751117cc07577a000b971971d8e03435c0bf66bc05dcdaf5425b1d6a5e965bf145d

        • C:\Users\Admin\AppData\Local\Temp\~72c5d870.tmp

          Filesize

          66KB

          MD5

          7d811bd4f3d9a36681d29a9bf434886f

          SHA1

          05fc70947d24d41992d7625dc7838f71751ae678

          SHA256

          99c40abca1952e7f96f1643f991d2d4633902affebc724951ab5a00995f10b38

          SHA512

          a77354c171a53f103d9a28ce96849edbfc1704a7474520accbcdd4f42a8a5751117cc07577a000b971971d8e03435c0bf66bc05dcdaf5425b1d6a5e965bf145d

        • C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp

          Filesize

          66KB

          MD5

          46e3f80067fdf038b8628505d16d0226

          SHA1

          88dc5b5ce31213413d6e28b8aa8abb38542a9e42

          SHA256

          d75ab02df1ee6bb5903ef2262eb0ac9c508e6f139bb49cbed288a40a8b22afa9

          SHA512

          49f0e0ac9ff56e2b9d26260e13c9ab6baeaee088c284e35dde1685b8e50ef2935cfc4fb020492b811169d57444cf344949b2ec0bf28543166e8eea7f1d34412d

        • C:\Users\Admin\AppData\Local\Temp\~8f776656.tmp

          Filesize

          66KB

          MD5

          46e3f80067fdf038b8628505d16d0226

          SHA1

          88dc5b5ce31213413d6e28b8aa8abb38542a9e42

          SHA256

          d75ab02df1ee6bb5903ef2262eb0ac9c508e6f139bb49cbed288a40a8b22afa9

          SHA512

          49f0e0ac9ff56e2b9d26260e13c9ab6baeaee088c284e35dde1685b8e50ef2935cfc4fb020492b811169d57444cf344949b2ec0bf28543166e8eea7f1d34412d

        • C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp

          Filesize

          66KB

          MD5

          7ba3fa8f6896f15d2a867539c4898b50

          SHA1

          6433aefa5839f0c9b8a8ae9fc8d59925e13c68f7

          SHA256

          32bf25f96a3bd3700de51c8a173e6934546c89b7826f9c3d40901dedf2c2d3a1

          SHA512

          dd7e70ec9bc3aed5fac2424d39b25ccc2113c92f4f575b09e3f1a418c70b78a722dc174b5ab81e13ed417daf726295b9aa051e9224cbfaca7c4f9696bd8a0404

        • C:\Users\Admin\AppData\Local\Temp\~ba81b99a.tmp

          Filesize

          66KB

          MD5

          7ba3fa8f6896f15d2a867539c4898b50

          SHA1

          6433aefa5839f0c9b8a8ae9fc8d59925e13c68f7

          SHA256

          32bf25f96a3bd3700de51c8a173e6934546c89b7826f9c3d40901dedf2c2d3a1

          SHA512

          dd7e70ec9bc3aed5fac2424d39b25ccc2113c92f4f575b09e3f1a418c70b78a722dc174b5ab81e13ed417daf726295b9aa051e9224cbfaca7c4f9696bd8a0404

        • C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp

          Filesize

          66KB

          MD5

          fd9645922c25532d367bd9babb41b1a6

          SHA1

          8579a30bd96c7eaf95d27805f761d6f197c4f49b

          SHA256

          126aa9c719215621ee238da228691954e15df30756c9337d8cbec1824b99a959

          SHA512

          d838c2725e4de007251016142ef37adfa34ba1165f79148253aaf0701494d1ce2e8d1dc15cd930c92255cc8de75d897b360c1aa726d894d82935a15a8a0c0f79

        • C:\Users\Admin\AppData\Local\Temp\~c8da51d8.tmp

          Filesize

          66KB

          MD5

          fd9645922c25532d367bd9babb41b1a6

          SHA1

          8579a30bd96c7eaf95d27805f761d6f197c4f49b

          SHA256

          126aa9c719215621ee238da228691954e15df30756c9337d8cbec1824b99a959

          SHA512

          d838c2725e4de007251016142ef37adfa34ba1165f79148253aaf0701494d1ce2e8d1dc15cd930c92255cc8de75d897b360c1aa726d894d82935a15a8a0c0f79

        • C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp

          Filesize

          66KB

          MD5

          6438df5d18f9a23413da74c20d3dfe03

          SHA1

          9db987c11c7f98e1b34d2925c0fbf24faa32a401

          SHA256

          6b5aa3449abace4cff231df7a6d0d535ed1dd883397dae6bd942777157324968

          SHA512

          e2c23d821553825f9c436e045107cad93789f5a4edec4d782cd1df2aad5ddb5f69bcd020224b7f249996e5db7a06e47b233d113c6955673aa589fa31d50c2a4b

        • C:\Users\Admin\AppData\Local\Temp\~e58be3a.tmp

          Filesize

          66KB

          MD5

          6438df5d18f9a23413da74c20d3dfe03

          SHA1

          9db987c11c7f98e1b34d2925c0fbf24faa32a401

          SHA256

          6b5aa3449abace4cff231df7a6d0d535ed1dd883397dae6bd942777157324968

          SHA512

          e2c23d821553825f9c436e045107cad93789f5a4edec4d782cd1df2aad5ddb5f69bcd020224b7f249996e5db7a06e47b233d113c6955673aa589fa31d50c2a4b

        • C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp

          Filesize

          66KB

          MD5

          0c7e7d4a317b1218b179dd965d4f0bed

          SHA1

          c48ba64cb1625c1b7400d11171b762dd5b1ae96a

          SHA256

          d213285df5e01e04a26e6ea5f1655c54e9660896de9114fe46150af5e7b87784

          SHA512

          4fc896c78fa13f44c38902bb6c8842d82e15ecf8a5e399f675bcd89eb30021fc6aec14f9246e335b02b61875bfafad1e7caa00a1fc82794fb283732563579aa2

        • C:\Users\Admin\AppData\Local\Temp\~e58bea8.tmp

          Filesize

          66KB

          MD5

          0c7e7d4a317b1218b179dd965d4f0bed

          SHA1

          c48ba64cb1625c1b7400d11171b762dd5b1ae96a

          SHA256

          d213285df5e01e04a26e6ea5f1655c54e9660896de9114fe46150af5e7b87784

          SHA512

          4fc896c78fa13f44c38902bb6c8842d82e15ecf8a5e399f675bcd89eb30021fc6aec14f9246e335b02b61875bfafad1e7caa00a1fc82794fb283732563579aa2

        • C:\Windows\SysWOW64\su212796.dll

          Filesize

          80KB

          MD5

          9b02808f4e0b8a5e71a37949b6db062b

          SHA1

          715e45ad25db0fd7d2c1d856906637fd6467715c

          SHA256

          0c8f585418bce392ecbd330bae9a3535a4d92a2c9283e031024612935641cc30

          SHA512

          91844eb4490713c328704a0e4351fbce976a72136622b21f56fd9ae6f821eb5aa445c61ad07d885e67b126a2e66c3bb73d8e90bc305ffb48c94dcac650c6f415

        • memory/1384-167-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/1668-171-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/1844-163-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/2348-132-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2348-138-0x0000000010000000-0x0000000010015000-memory.dmp

          Filesize

          84KB

        • memory/2348-137-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2348-135-0x0000000010000000-0x0000000010015000-memory.dmp

          Filesize

          84KB

        • memory/3584-151-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/4188-143-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/4188-141-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/4436-159-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/4668-147-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/5060-155-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB