Analysis

  • max time kernel
    238s
  • max time network
    332s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 17:32

General

  • Target

    f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7.exe

  • Size

    316KB

  • MD5

    8ba6496918e6a28bb44e6ff4675225ae

  • SHA1

    6ce62b9284e939a846904cf61765a9c0fb2db205

  • SHA256

    f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7

  • SHA512

    5876e380bf8c081f41773599267ef2a7152c41db386dd9eb68e77048b2aa42552fa1489b824edcd33d649802b74dabd8689cbc737ac4f9a45d3bc761e13643ff

  • SSDEEP

    6144:85DVzBjn7ctC85AtZA/kimSk/wOw6z+pkT8hcJ2le:855dj7C5RZhaw4+48hG2le

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7.exe
    "C:\Users\Admin\AppData\Local\Temp\f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\UNINSTAL.BAT
      2⤵
      • Deletes itself
      PID:1524
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1644

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Hacker.com.cn.exe

            Filesize

            316KB

            MD5

            8ba6496918e6a28bb44e6ff4675225ae

            SHA1

            6ce62b9284e939a846904cf61765a9c0fb2db205

            SHA256

            f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7

            SHA512

            5876e380bf8c081f41773599267ef2a7152c41db386dd9eb68e77048b2aa42552fa1489b824edcd33d649802b74dabd8689cbc737ac4f9a45d3bc761e13643ff

          • C:\Windows\Hacker.com.cn.exe

            Filesize

            316KB

            MD5

            8ba6496918e6a28bb44e6ff4675225ae

            SHA1

            6ce62b9284e939a846904cf61765a9c0fb2db205

            SHA256

            f51b9c6a5ae28f7d98ca5502fc4615fd49e8b54c12acdded697afd63771cbaf7

            SHA512

            5876e380bf8c081f41773599267ef2a7152c41db386dd9eb68e77048b2aa42552fa1489b824edcd33d649802b74dabd8689cbc737ac4f9a45d3bc761e13643ff

          • C:\Windows\UNINSTAL.BAT

            Filesize

            254B

            MD5

            80e1503d9fceefdf691cfc33b4ddabaf

            SHA1

            01e31365ec75056107d5e439f64c6a7372784e65

            SHA256

            230b96ce4961d06c7836b46194010ed19316856b0204c8b840d5a671cfbfa132

            SHA512

            ba8344c4449df0730d5735d45b18b62fc6e0d449a5e5a539fe7379a8cc1baf1c92ffe486f6061fbd5f23db224252f1cd0ba92a78e4112937899d53d77b0ad5f0

          • memory/752-54-0x0000000075531000-0x0000000075533000-memory.dmp

            Filesize

            8KB

          • memory/752-55-0x0000000000400000-0x0000000000516000-memory.dmp

            Filesize

            1.1MB

          • memory/788-59-0x0000000000400000-0x0000000000516000-memory.dmp

            Filesize

            1.1MB