Analysis

  • max time kernel
    145s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 00:11

General

  • Target

    70511d3cae47c93ee36382109ceefcc18baa0241e9ad316be6577118cb14d043.exe

  • Size

    259KB

  • MD5

    04481303b4b82c75931521559373b577

  • SHA1

    39d1e6ccd4c3125d91f26c1b8c98543cd12a682e

  • SHA256

    70511d3cae47c93ee36382109ceefcc18baa0241e9ad316be6577118cb14d043

  • SHA512

    eedc332fef05cf633ea55225b0aa11a25aed9372a106850d3b56e8527fa2716dfbd92c2afdb1dc7c56d3b885291e45466f2f0d1003d30e57c0f5e686097f44d7

  • SSDEEP

    6144:Jadiw9yt8Q2bsfh6tkezrLVkwKL3fR+Vteqmr:EF9yt8QBhoLVmL3Yb8

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 8 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70511d3cae47c93ee36382109ceefcc18baa0241e9ad316be6577118cb14d043.exe
    "C:\Users\Admin\AppData\Local\Temp\70511d3cae47c93ee36382109ceefcc18baa0241e9ad316be6577118cb14d043.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Documents and Settings\tazebama.dl_
      "C:\Documents and Settings\tazebama.dl_"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 316
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • C:\Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dl_

    Filesize

    149KB

    MD5

    038f26356da2ef82937b6c6734dfcf3b

    SHA1

    1c0d480dcd2f413e70fa52921fc9240f5858996e

    SHA256

    1521b49a030032b924f9b0e92eda4167c4be373c80ad467f710b80d94c2de3a6

    SHA512

    63a76905caec84d84adc9e09111574cde8531d24e06d9474a849995cf81075a9ab0b45c8a3ea32fea9b7d65cec5a9038f51d3adc2f082b9cd45db8fd11a4163c

  • \Users\tazebama.dll

    Filesize

    32KB

    MD5

    b6a03576e595afacb37ada2f1d5a0529

    SHA1

    d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8

    SHA256

    1707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad

    SHA512

    181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c

  • memory/1952-63-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1952-64-0x00000000754E1000-0x00000000754E3000-memory.dmp

    Filesize

    8KB

  • memory/1952-71-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2000-58-0x0000000000160000-0x0000000000176000-memory.dmp

    Filesize

    88KB

  • memory/2000-62-0x0000000001000000-0x0000000001020000-memory.dmp

    Filesize

    128KB

  • memory/2000-56-0x0000000001000000-0x0000000001020000-memory.dmp

    Filesize

    128KB

  • memory/2000-55-0x0000000001000000-0x0000000001020000-memory.dmp

    Filesize

    128KB