Analysis

  • max time kernel
    147s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:06

General

  • Target

    dcfb140fd01a95a82eeef9cca6c44cc4d61dd6aaa09e92fa54d0ba221f6a571b.exe

  • Size

    361KB

  • MD5

    6a6dabdfb8feef37908ff6927beaa50b

  • SHA1

    8eeb62f1ba6f3a027fdf955786684212511c21f9

  • SHA256

    dcfb140fd01a95a82eeef9cca6c44cc4d61dd6aaa09e92fa54d0ba221f6a571b

  • SHA512

    c622bb63f6f07d66b4d688104cbb288fd1e7d3234195958f3caf4700878217f3ad9c199014fc97f6d9187ede52cf2639fdc8b1156f63c891d75a48e30f32b096

  • SSDEEP

    6144:2flfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:2flfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcfb140fd01a95a82eeef9cca6c44cc4d61dd6aaa09e92fa54d0ba221f6a571b.exe
    "C:\Users\Admin\AppData\Local\Temp\dcfb140fd01a95a82eeef9cca6c44cc4d61dd6aaa09e92fa54d0ba221f6a571b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Temp\plhvuqmiedznjiea.exe
      C:\Temp\plhvuqmiedznjiea.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\nxgqaktdno.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2040
        • C:\Temp\nxgqaktdno.exe
          C:\Temp\nxgqaktdno.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:784
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1996
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:828
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_nxgqaktdno.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1800
        • C:\Temp\i_nxgqaktdno.exe
          C:\Temp\i_nxgqaktdno.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1264
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:616

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • C:\Temp\i_nxgqaktdno.exe

          Filesize

          361KB

          MD5

          e114fca73d92152917c4267aa2ab9e7a

          SHA1

          059b46d631fab4af9ba530063665d1d57829b8dc

          SHA256

          0c0590174c89efbee891638c36d4ff1b1a216453c477a3385276abeb62b8f8c7

          SHA512

          2ed640ace51a8b5585ba022079ccfbb75db17f8af78d99427bfd9bb6e898791422dd6ad50ecefb62f8937fb9cba4f3b4cff8c54ede10d5d8d47fab942d78ed00

        • C:\Temp\nxgqaktdno.exe

          Filesize

          361KB

          MD5

          520b457a551cb517bb01fbb39062bf8c

          SHA1

          99014013babdbab866a1e7e0f4ccff05c51ea173

          SHA256

          a9e7e2107289cd23b28b3b40cb4d89c96be84b0608e6cf0fb7c0b6d002bed83b

          SHA512

          80a2080a23832f8630248f763f0fa153e29270d0935b2f54738221aa946fe15b5a808347e40894fc3cb25162cdf328801203b76ba7ad897a2238681caf74d940

        • C:\Temp\plhvuqmiedznjiea.exe

          Filesize

          361KB

          MD5

          90a2bda5c3017fd1458c6990cf6b2aab

          SHA1

          c88f6fd5d03b5351acdcb8279a81ef783117ab88

          SHA256

          c52ad93abdf74127e1efea37bd0d86b9f79e930b1c0280846b9faefd8e36e6bc

          SHA512

          8f59ada18615a74cf11b345ea78031894b6bb66fe451448ccfa0a6c4a5fae71a76936e482f9f1fba83d1dbc9f389f77089f7fc1e9d707df4a205efef4e91383c

        • C:\Temp\plhvuqmiedznjiea.exe

          Filesize

          361KB

          MD5

          90a2bda5c3017fd1458c6990cf6b2aab

          SHA1

          c88f6fd5d03b5351acdcb8279a81ef783117ab88

          SHA256

          c52ad93abdf74127e1efea37bd0d86b9f79e930b1c0280846b9faefd8e36e6bc

          SHA512

          8f59ada18615a74cf11b345ea78031894b6bb66fe451448ccfa0a6c4a5fae71a76936e482f9f1fba83d1dbc9f389f77089f7fc1e9d707df4a205efef4e91383c

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WPRGQ08W.txt

          Filesize

          601B

          MD5

          2c0ac53d23e6a25e0233f0d44d9bd37b

          SHA1

          ecc0a55fe61f94edd64bcdfb3180b3bc77c08512

          SHA256

          b02b8e2c390ccdd7226cfd1ea62c6b51175212b98297fab1398606edc4984777

          SHA512

          a4823f5ae55d9e2e2a2ba39d0c0e28bfc48c45863f1ae95ccde8fda7705b1476ebbc4ca831e812422aec7b3e44f409bcc8e3d5904f46880bd1a8c1caa654f979

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          67aecb720cb71f03266a77656ea855ef

          SHA1

          172c8ac89419272256c5575313484afb9183813b

          SHA256

          987eaf485327b36eab4ad7e0af2d58d9f91633dab7c4f49b66737d6ef5ef6934

          SHA512

          d3373fbc61d91321f50367ddaefeaa52247441f4ce01b6b095308af0645e7c0a06aeedaf707cd2cf58e2b8d2915418187217886177518b74185833d09b2f9301

        • \Temp\plhvuqmiedznjiea.exe

          Filesize

          361KB

          MD5

          90a2bda5c3017fd1458c6990cf6b2aab

          SHA1

          c88f6fd5d03b5351acdcb8279a81ef783117ab88

          SHA256

          c52ad93abdf74127e1efea37bd0d86b9f79e930b1c0280846b9faefd8e36e6bc

          SHA512

          8f59ada18615a74cf11b345ea78031894b6bb66fe451448ccfa0a6c4a5fae71a76936e482f9f1fba83d1dbc9f389f77089f7fc1e9d707df4a205efef4e91383c