Analysis

  • max time kernel
    338s
  • max time network
    341s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 20:08

General

  • Target

    RMHOOK.exe

  • Size

    13.6MB

  • MD5

    b1434b82c5a9f1dae4d3844d49e71d2b

  • SHA1

    358a68782de28330f3bd330e481faa30a8ad322a

  • SHA256

    62f624a2ac863cf0fd91916b4536c44446954e29f2232629f3e4cb02a4ec1dc5

  • SHA512

    2e669a708cae00dc6cbf8905626373bcfc10d30922228cc6715f80e897a49d3fd1a50eeea49d4b9e1acd589d3c0f07ca38b0721fdc82654a840a7c1676139fd4

  • SSDEEP

    196608:4urGVwgaunHfoOEs7ayo5xxa107oC/+EGxFDon9XoUJoyVytZkp8mjMMfyaBS:7KVwgt/zviFhoCY7El5FYtZkp8mF/

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RMHOOK.exe
    "C:\Users\Admin\AppData\Local\Temp\RMHOOK.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1056
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x50c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:268
  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:1424
  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1572
    • C:\Windows\system32\utilman.exe
      utilman.exe /debug
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\System32\Narrator.exe
        "C:\Windows\System32\Narrator.exe"
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:752
      • C:\Windows\System32\Magnify.exe
        "C:\Windows\System32\Magnify.exe"
        3⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1792
      • C:\Windows\System32\Sethc.exe
        "C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent
        3⤵
          PID:664
        • C:\Windows\System32\osk.exe
          "C:\Windows\System32\osk.exe"
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1628
        • C:\Windows\System32\Sethc.exe
          "C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent
          3⤵
            PID:532
          • C:\Windows\System32\Sethc.exe
            "C:\Windows\System32\Sethc.exe" /AccessibilitySoundAgent
            3⤵
              PID:1932
          • C:\Windows\system32\sethc.exe
            sethc.exe 101
            2⤵
            • Modifies data under HKEY_USERS
            PID:188
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
          1⤵
            PID:672
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            1⤵
              PID:2612
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x1
              1⤵
                PID:2736

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_766C81A2282241A7936EAC1B424CC035.dat

                Filesize

                940B

                MD5

                92507f3469038324d1ce7879cd4ff0c7

                SHA1

                b471cf8e3aafc92e437de8bc6bcd11e86cb1afbc

                SHA256

                c60c28ac8edaf1fa7ac7ad0e65c95716abacca280b5c6d28edfecd289cce7713

                SHA512

                70915a513b8f53c7796801623d4aef9bad4bc05b7713e4d37ada558bc63298f3380212cb233ff3003576a31faba85ab52da7a5c037b27bb9b173f7b8b14e5e9c

              • memory/752-94-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-176-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-177-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-64-0x0000000000A70000-0x0000000000B7A000-memory.dmp

                Filesize

                1.0MB

              • memory/752-65-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-95-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-97-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/752-96-0x0000000000EA0000-0x0000000000F20000-memory.dmp

                Filesize

                512KB

              • memory/1056-55-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

                Filesize

                8KB

              • memory/1056-56-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

                Filesize

                8KB

              • memory/1056-54-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

                Filesize

                8KB

              • memory/1476-91-0x0000000000880000-0x0000000000890000-memory.dmp

                Filesize

                64KB

              • memory/1476-63-0x0000000000410000-0x0000000000411000-memory.dmp

                Filesize

                4KB

              • memory/1572-59-0x00000000026E0000-0x00000000026E1000-memory.dmp

                Filesize

                4KB

              • memory/1628-178-0x0000000001580000-0x0000000001581000-memory.dmp

                Filesize

                4KB

              • memory/1792-98-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

                Filesize

                4KB

              • memory/2612-179-0x00000000014D0000-0x00000000014D1000-memory.dmp

                Filesize

                4KB

              • memory/2736-181-0x00000000026E0000-0x00000000026E1000-memory.dmp

                Filesize

                4KB