Analysis

  • max time kernel
    204s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 20:09

General

  • Target

    b7918f9bafee7848a142b002c4ebcc3d234b6a564dc4d7640feb580eb21bb5b3.exe

  • Size

    361KB

  • MD5

    4efe774246d24e13c8d368b6feacca5c

  • SHA1

    8dbeb2f5ca7e718783b0287107bdbf436b9219ac

  • SHA256

    b7918f9bafee7848a142b002c4ebcc3d234b6a564dc4d7640feb580eb21bb5b3

  • SHA512

    8a843c4d4d536dad61e4a545f2dd31282be747faf3fca7d29d065a547b191bba892b68f72f101aab37f722cb8055c1c3d116b8c193f03cad2a6eb33828c8a5e0

  • SSDEEP

    6144:cflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:cflfAsiVGjSGecvX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7918f9bafee7848a142b002c4ebcc3d234b6a564dc4d7640feb580eb21bb5b3.exe
    "C:\Users\Admin\AppData\Local\Temp\b7918f9bafee7848a142b002c4ebcc3d234b6a564dc4d7640feb580eb21bb5b3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Temp\vkdztmibyjczsoib.exe
      C:\Temp\vkdztmibyjczsoib.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ipzjqakqah.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:796
        • C:\Temp\ipzjqakqah.exe
          C:\Temp\ipzjqakqah.exe ups_run
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1132
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1404
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1428
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ipzjqakqah.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:396
        • C:\Temp\i_ipzjqakqah.exe
          C:\Temp\i_ipzjqakqah.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1672
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1920

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • C:\Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • C:\Temp\i_ipzjqakqah.exe

          Filesize

          361KB

          MD5

          f221be10c0da963fce995ab1f82751e9

          SHA1

          098568af05486dda3b9e72165528943cd80f00dc

          SHA256

          5d3760fd9345f523928f023d9c7901a27d219c055c263767149f382a67f2f2af

          SHA512

          fc11136312689e6b6635bb4d510688754c34980e6b8c4b20e1fbd0409bdaef5dae586e5c403796e62fbd67f592b68c619091e155fd84e5ae58c9e4a8793a57ad

        • C:\Temp\ipzjqakqah.exe

          Filesize

          361KB

          MD5

          8d9313814022c269c3af1fda92f8fdec

          SHA1

          1e9e2c3fc574fb6363ad17a336f62e1017f992f5

          SHA256

          0fba04372406eb2b451556562a60b56e3312cc13a5c6bc4f64c4c7aa2d87bfae

          SHA512

          945b237f7258128288b3fede0bc6f5672a2f44d5309d152129b0409a97596ea2d7a8678916d1587f257fadf555c4a3b992644d33dcfd207f131b25f7e08ec307

        • C:\Temp\vkdztmibyjczsoib.exe

          Filesize

          361KB

          MD5

          2af25037d9301ebe23974539ce17f9ba

          SHA1

          50f391cb5d6183d7d7ffbfc8c618cfb4c9036214

          SHA256

          a884cd0003180990b465c63b32d127fa9342a7d3336f8ea4abbfb3cd108a3ca9

          SHA512

          92de1272c2cf897b4d349c7117b225914c4e233bed4884db545d7c5bff0affd3010cf3b014e7d0623edcc0f52228c25056576670cfdfc289cb7de8d2b4f4d5bf

        • C:\Temp\vkdztmibyjczsoib.exe

          Filesize

          361KB

          MD5

          2af25037d9301ebe23974539ce17f9ba

          SHA1

          50f391cb5d6183d7d7ffbfc8c618cfb4c9036214

          SHA256

          a884cd0003180990b465c63b32d127fa9342a7d3336f8ea4abbfb3cd108a3ca9

          SHA512

          92de1272c2cf897b4d349c7117b225914c4e233bed4884db545d7c5bff0affd3010cf3b014e7d0623edcc0f52228c25056576670cfdfc289cb7de8d2b4f4d5bf

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\YHC8RQXN.txt

          Filesize

          608B

          MD5

          a260643a4806868113d65c486a619867

          SHA1

          63bc7cef3894fab8e6ec25620c6ca6433e428051

          SHA256

          2844b9aa7155a2477176f4a8e1fd1380a45e9a0fab74fcbfc398dd42dc43bfe9

          SHA512

          0d31f8151ff8ccfadf22afa7c7f75e190dc9596569f5921f2564fbc373cd152f827b78485f3f7703a06fad3d74c148243a904387b7081976b0692487f16a2160

        • C:\temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • \Temp\CreateProcess.exe

          Filesize

          3KB

          MD5

          a9e3ffe4a8fcc635652b558724ab7c8e

          SHA1

          b5ec95ced50e80d4778a4e6efa633ad748b40961

          SHA256

          f73c14ee746f3e2e2a73dbc618c16a1f5420ddf058878da03ebcf5aff06fdccf

          SHA512

          317ce2172801723864f003aa0490e70e2e8b3d3799fd118d9751339850804982bc6fee02015e00594f764f5ae206f765cb237a6609e8d8856e9e4ce0a306b6a2

        • \Temp\vkdztmibyjczsoib.exe

          Filesize

          361KB

          MD5

          2af25037d9301ebe23974539ce17f9ba

          SHA1

          50f391cb5d6183d7d7ffbfc8c618cfb4c9036214

          SHA256

          a884cd0003180990b465c63b32d127fa9342a7d3336f8ea4abbfb3cd108a3ca9

          SHA512

          92de1272c2cf897b4d349c7117b225914c4e233bed4884db545d7c5bff0affd3010cf3b014e7d0623edcc0f52228c25056576670cfdfc289cb7de8d2b4f4d5bf