Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 21:37

General

  • Target

    mmc-stable-windows.zip

  • Size

    13.4MB

  • MD5

    45373f75c382eca0c44cba6915d7f6b7

  • SHA1

    34ed4532d48a8d58bb845f5c6a5927aaa260fab9

  • SHA256

    2ef69f36d3a99e423ae6b8de52168fd26656d0c274845270000b013043daac7e

  • SHA512

    34d27b7cc81f8f2ac4ff73c340e608f32dc8af16c899b17018c40305fd1cf1d7b75264f9b9a4ec79a1b74836eeea872bed25a99a7e57a2c5445b2cb7fa3aa1f8

  • SSDEEP

    196608:9Zkgd/mcKTMG3GS6iw+7WLqB8114REWkcJXTkHAhWsWxCNqm567aQvsLB0Sqdpfz:Ay/mqG3GVinAqB818h6H/xRm56Wh9+V

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\mmc-stable-windows.zip
    1⤵
      PID:952
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="852.0.1768169559\1115075827" -parentBuildID 20200403170909 -prefsHandle 1172 -prefMapHandle 1164 -prefsLen 1 -prefMapSize 219933 -appdir "C:\Program Files\Mozilla Firefox\browser" - 852 "\\.\pipe\gecko-crash-server-pipe.852" 1256 gpu
          3⤵
            PID:1448
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="852.3.745460934\1920400097" -childID 1 -isForBrowser -prefsHandle 1584 -prefMapHandle 1576 -prefsLen 156 -prefMapSize 219933 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 852 "\\.\pipe\gecko-crash-server-pipe.852" 1556 tab
            3⤵
              PID:1652
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="852.13.2062427168\818970426" -childID 2 -isForBrowser -prefsHandle 2608 -prefMapHandle 2604 -prefsLen 6938 -prefMapSize 219933 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 852 "\\.\pipe\gecko-crash-server-pipe.852" 2620 tab
              3⤵
                PID:1928
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x580
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2536

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads