Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18/05/2023, 14:20

General

  • Target

    Systemsikkerhed.exe

  • Size

    667KB

  • MD5

    cf245e60ca70cb7b4204d519d2769fee

  • SHA1

    739de33b60f782cb1f36b920476ca8380763a085

  • SHA256

    dc73a2a97d1abe91038bd97ec6d0c6fa54f4b64632a555fa536aed70234d80fe

  • SHA512

    daa634e2e01c321938c57148ca2a56a29c046949b1f6b3f96e3fc5d02c42d058a82e8d60f377348907ca33f24c5cf1e3ee5de754aa2c995b48bb76083f01edc7

  • SSDEEP

    12288:phrO+Gr3sInVhS9UTf9SF6UWQE/onCO6S:ptxGr8IVhbcWQE/0

Score
7/10

Malware Config

Signatures

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Systemsikkerhed.exe
    "C:\Users\Admin\AppData\Local\Temp\Systemsikkerhed.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\Systemsikkerhed.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemsikkerhed.exe"
      2⤵
      • Checks QEMU agent file
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1900

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Fonts\underdrying.lnk

          Filesize

          1KB

          MD5

          061481fe5e0472c50b3d0aca251eff85

          SHA1

          7219297e875514ffed83c034ba7b77b51be5394a

          SHA256

          a6af93466dd4b5e6a07d3d271a655cd3933cfd09bd22a0bb32f60e5641f06af1

          SHA512

          ee6660fd6d9909c711b8d745e9b8f45a5ba33cbfafc934945b3eb79c687c9efdf09cc8071d6ac09097fdb283fa0e20949f948f80b1ad1cbf81a2dfb0d99d0fe9

        • \Users\Admin\AppData\Local\Temp\nso8D05.tmp\System.dll

          Filesize

          12KB

          MD5

          0d7ad4f45dc6f5aa87f606d0331c6901

          SHA1

          48df0911f0484cbe2a8cdd5362140b63c41ee457

          SHA256

          3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

          SHA512

          c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

        • memory/1900-93-0x0000000000400000-0x0000000001462000-memory.dmp

          Filesize

          16.4MB

        • memory/1900-94-0x0000000000400000-0x0000000001462000-memory.dmp

          Filesize

          16.4MB

        • memory/1900-117-0x0000000000400000-0x0000000001462000-memory.dmp

          Filesize

          16.4MB