Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2023, 05:29

General

  • Target

    EEcbDKtUD5MqK0g.exe

  • Size

    972KB

  • MD5

    f6cf8bf74259e4cf8feacbf5b4d7a86c

  • SHA1

    629472079c3022ff904ac46705cd03808194722e

  • SHA256

    6d481e182171f2ecd8842f6fa904656313640da4477655d0732a378809d58d7a

  • SHA512

    718f94777503d3cd7bd33b44c623246ea93bb8f933dd31709e0742781431ebcd79a74eb916793094175c20fa3460dcaf90931c661ca1a4348a2ac180d184a0d2

  • SSDEEP

    24576:b/PiwOvFzdvwe0PZe+LfnQpbZnN4LgDFr9lv6n:3mFhZ0ZeiPQPnNpDR9R6n

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\EEcbDKtUD5MqK0g.exe
      "C:\Users\Admin\AppData\Local\Temp\EEcbDKtUD5MqK0g.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\EEcbDKtUD5MqK0g.exe
        "C:\Users\Admin\AppData\Local\Temp\EEcbDKtUD5MqK0g.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:580
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1460

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\q2ml0.zip

            Filesize

            486KB

            MD5

            1e73cacce02ae20026a81f1e56416aa3

            SHA1

            f491a7301ce11cf11a92c0245c7e03d927422286

            SHA256

            0dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2

            SHA512

            afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            927KB

            MD5

            7fd80b1cc72dc580c02ca4cfbfb2592d

            SHA1

            18da905af878b27151b359cf1a7d0a650764e8a1

            SHA256

            1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

            SHA512

            13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

          • memory/580-68-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/580-64-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/580-69-0x00000000001E0000-0x00000000001F0000-memory.dmp

            Filesize

            64KB

          • memory/580-67-0x0000000000870000-0x0000000000B73000-memory.dmp

            Filesize

            3.0MB

          • memory/580-65-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/580-62-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/580-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/580-61-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1224-82-0x0000000004970000-0x0000000004A3A000-memory.dmp

            Filesize

            808KB

          • memory/1224-70-0x0000000004D00000-0x0000000004DED000-memory.dmp

            Filesize

            948KB

          • memory/1224-66-0x0000000000290000-0x0000000000390000-memory.dmp

            Filesize

            1024KB

          • memory/1224-76-0x0000000004970000-0x0000000004A3A000-memory.dmp

            Filesize

            808KB

          • memory/1396-78-0x0000000001D70000-0x0000000001DFF000-memory.dmp

            Filesize

            572KB

          • memory/1396-75-0x0000000001EB0000-0x00000000021B3000-memory.dmp

            Filesize

            3.0MB

          • memory/1396-74-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB

          • memory/1396-71-0x0000000000220000-0x000000000023F000-memory.dmp

            Filesize

            124KB

          • memory/1396-72-0x0000000000220000-0x000000000023F000-memory.dmp

            Filesize

            124KB

          • memory/1396-73-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB

          • memory/1396-124-0x0000000061E00000-0x0000000061ED2000-memory.dmp

            Filesize

            840KB

          • memory/1456-54-0x00000000010E0000-0x00000000011DA000-memory.dmp

            Filesize

            1000KB

          • memory/1456-59-0x0000000005950000-0x0000000005A38000-memory.dmp

            Filesize

            928KB

          • memory/1456-60-0x0000000004EA0000-0x0000000004F12000-memory.dmp

            Filesize

            456KB

          • memory/1456-58-0x0000000000350000-0x000000000035C000-memory.dmp

            Filesize

            48KB

          • memory/1456-56-0x0000000000300000-0x0000000000314000-memory.dmp

            Filesize

            80KB

          • memory/1456-55-0x0000000000A20000-0x0000000000A60000-memory.dmp

            Filesize

            256KB

          • memory/1456-57-0x0000000000A20000-0x0000000000A60000-memory.dmp

            Filesize

            256KB