Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 14:31

General

  • Target

    5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe

  • Size

    301KB

  • MD5

    02983d1ee58659ef00f8224fa6f47140

  • SHA1

    1fc597b182be27ae5b4cc8aba778d3bb3af98144

  • SHA256

    5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa

  • SHA512

    9659e33c67a4250f1f08d75d7af65fc72b672ca5ee672eca853266a2b9fe82045ac86b63df2ab7054c25a266b3b2c8ed71029cb43591538aec1607fbfff4a258

  • SSDEEP

    6144:QFGJaxOE5IKV+JbS41CzuxhgdQMLVOQHHJfJrXM61a3FicnWV72ex:T8D5IK8P1CzhyMLZJZ1a3Ficn4Se

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1224
      • C:\Users\Admin\AppData\Local\Temp\5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe
        "C:\Users\Admin\AppData\Local\Temp\5307bddde533f0e5908172b06ca4c6ede5ed6c60d92c9fcb8cde0e64ca1048aa.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe
          "C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:980
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\RQQE659.bat"
          3⤵
          • Deletes itself
          PID:584
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1196
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1120

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RQQE659.bat

          Filesize

          303B

          MD5

          a540fe270e9027a135283f321710fad7

          SHA1

          f2d3804cb18f0bfd8d3247c93effc63c0344410f

          SHA256

          257d5df56acf2fcb4c37a08fd940bb5b3d6a6b8c7fe89a86feda507001939c39

          SHA512

          75f3bb8ac7b60a8edc2f35cd14b55b22f2680f22664de26d0a3109525f079a15f4bd80b442322f672837ded979a71d27f699dbc636473cbd87f3cbcd3c369357

        • C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe

          Filesize

          301KB

          MD5

          25f4203cc361d4d25019d34e2b35fcf1

          SHA1

          5949c0c02a63c87fb46d0ea196802d1f97a97909

          SHA256

          f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6

          SHA512

          e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14

        • C:\Users\Admin\AppData\Roaming\Ijgi\omzaha.exe

          Filesize

          301KB

          MD5

          25f4203cc361d4d25019d34e2b35fcf1

          SHA1

          5949c0c02a63c87fb46d0ea196802d1f97a97909

          SHA256

          f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6

          SHA512

          e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14

        • \Users\Admin\AppData\Roaming\Ijgi\omzaha.exe

          Filesize

          301KB

          MD5

          25f4203cc361d4d25019d34e2b35fcf1

          SHA1

          5949c0c02a63c87fb46d0ea196802d1f97a97909

          SHA256

          f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6

          SHA512

          e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14

        • \Users\Admin\AppData\Roaming\Ijgi\omzaha.exe

          Filesize

          301KB

          MD5

          25f4203cc361d4d25019d34e2b35fcf1

          SHA1

          5949c0c02a63c87fb46d0ea196802d1f97a97909

          SHA256

          f011129bdc27850ea2a4c187924c6e9a2e15bfb9182e99f69ca27288a83c07f6

          SHA512

          e1a58bf24d87a4c3b18df693a6b13f764ad11044b6d0a07ba8e1a28bb7b69bc7e3f74706608777de5617c847d54543868f849d95be6e41916491737de8930c14

        • memory/268-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

          Filesize

          8KB

        • memory/268-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-55-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/268-85-0x00000000025C0000-0x0000000002609000-memory.dmp

          Filesize

          292KB

        • memory/268-95-0x00000000025C0000-0x0000000002609000-memory.dmp

          Filesize

          292KB

        • memory/268-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-56-0x0000000000401000-0x0000000000442000-memory.dmp

          Filesize

          260KB

        • memory/268-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/268-88-0x00000000025C0000-0x0000000002609000-memory.dmp

          Filesize

          292KB

        • memory/268-87-0x00000000025C0000-0x0000000002609000-memory.dmp

          Filesize

          292KB

        • memory/268-86-0x00000000025C0000-0x0000000002609000-memory.dmp

          Filesize

          292KB

        • memory/584-98-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/584-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-113-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/584-101-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/584-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-100-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/584-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/584-103-0x0000000000083B6A-mapping.dmp

        • memory/584-102-0x0000000000050000-0x0000000000099000-memory.dmp

          Filesize

          292KB

        • memory/980-59-0x0000000000000000-mapping.dmp

        • memory/980-63-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1120-65-0x0000000001BE0000-0x0000000001C29000-memory.dmp

          Filesize

          292KB

        • memory/1120-67-0x0000000001BE0000-0x0000000001C29000-memory.dmp

          Filesize

          292KB

        • memory/1120-68-0x0000000001BE0000-0x0000000001C29000-memory.dmp

          Filesize

          292KB

        • memory/1120-69-0x0000000001BE0000-0x0000000001C29000-memory.dmp

          Filesize

          292KB

        • memory/1120-70-0x0000000001BE0000-0x0000000001C29000-memory.dmp

          Filesize

          292KB

        • memory/1196-73-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1196-74-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1196-75-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1196-76-0x0000000000120000-0x0000000000169000-memory.dmp

          Filesize

          292KB

        • memory/1224-81-0x0000000002A40000-0x0000000002A89000-memory.dmp

          Filesize

          292KB

        • memory/1224-79-0x0000000002A40000-0x0000000002A89000-memory.dmp

          Filesize

          292KB

        • memory/1224-80-0x0000000002A40000-0x0000000002A89000-memory.dmp

          Filesize

          292KB

        • memory/1224-82-0x0000000002A40000-0x0000000002A89000-memory.dmp

          Filesize

          292KB