Analysis

  • max time kernel
    83s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2023, 19:37

General

  • Target

    9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877.exe

  • Size

    143KB

  • MD5

    4dbe432b8c1bbe4b3a45f2b202c1781d

  • SHA1

    9aeae6ca0f74a0914316e3724bd485552211747b

  • SHA256

    9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877

  • SHA512

    9ca345c66b9ba91f8d73f6fab8beb460f8e5339c6d92a75f64e7ba450823efa5d255b95fbe26fb9bc51140de65e33988bc09ed5ab910dad082aad991181d0488

  • SSDEEP

    3072:1C7BOGKCXjYp8idHQbPRyZ2pP9EPgg0F:1GWCXdw8AZ2LEP

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.54.104.71
  • Port:
    21
  • Username:
    123
  • Password:
    123

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877.exe
    "C:\Users\Admin\AppData\Local\Temp\9f2a9306317e06d37364c4622791ce551093e3cc51104078631b9a2a28aa4877.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\ProgramData\winnt\local.exe
      "C:\ProgramData\winnt\local.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1988
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\ProgramData\bat\CreatLink.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\mshta.exe
        mshta VBScript:Execute("Set a=CreateObject(""WScript.Shell""):Set b=a.CreateShortcut(""C:\\ProgramData\\WindowsTask\\WindowsTask.lnk.lnk""):b.TargetPath=""C:\ProgramData\winnt\music.exe"":b.WorkingDirectory=""C:\ProgramData\winnt\"":b.Save:close")
        3⤵
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        PID:288
    • C:\ProgramData\winnt\local.exe
      "C:\ProgramData\winnt\local.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1644
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\ProgramData\bat\CreatLink.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\mshta.exe
        mshta VBScript:Execute("Set a=CreateObject(""WScript.Shell""):Set b=a.CreateShortcut(""C:\\ProgramData\\WindowsTask\\WindowsTask.lnk.lnk""):b.TargetPath=""C:\ProgramData\winnt\music.exe"":b.WorkingDirectory=""C:\ProgramData\winnt\"":b.Save:close")
        3⤵
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        PID:1868
  • C:\Users\Admin\AppData\Local\Temp\{7975D166-B049-4b24-854E-F27E4C5513F2}.exe
    "C:\Users\Admin\AppData\Local\Temp\{7975D166-B049-4b24-854E-F27E4C5513F2}.exe" "C:\Users\Admin\AppData\Local\Temp\\{FFFE279F-456D-430b-A169-8BCD875B9C9F}.lnk"
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v "Startup" /t REG_EXPAND_SZ /d "C:\ProgramData\WindowsTask" /f
      2⤵
        PID:1764
    • C:\Users\Admin\AppData\Local\Temp\{85A4F4FE-CFF2-44ce-A372-134C08DAB754}.exe
      "C:\Users\Admin\AppData\Local\Temp\{85A4F4FE-CFF2-44ce-A372-134C08DAB754}.exe" "C:\Users\Admin\AppData\Local\Temp\\{FD7558AC-A9A5-47b5-BB30-4952598CB221}.lnk"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v "Startup" /t REG_EXPAND_SZ /d "C:\ProgramData\WindowsTask" /f
        2⤵
          PID:1228

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\bat\CreatLink.bat

              Filesize

              642B

              MD5

              8b97ac0cd9c3fb87baaeeaff3371a578

              SHA1

              96deebb464befc1fe5c4b36e20c67a978577e0c6

              SHA256

              e840947f5753c8864d50dd6107748f0904708a508db36ee783977a94fc9c1146

              SHA512

              81a60460bcf7681ca783a0a21a911d66b6e4ae842bdf4e510dd08446e5a28b21af5dada085eebee114e33bef8b6834694c4cb2dcf2aae9a3d4ea36f1bad5afd4

            • C:\ProgramData\bat\CreatLink.bat

              Filesize

              642B

              MD5

              8b97ac0cd9c3fb87baaeeaff3371a578

              SHA1

              96deebb464befc1fe5c4b36e20c67a978577e0c6

              SHA256

              e840947f5753c8864d50dd6107748f0904708a508db36ee783977a94fc9c1146

              SHA512

              81a60460bcf7681ca783a0a21a911d66b6e4ae842bdf4e510dd08446e5a28b21af5dada085eebee114e33bef8b6834694c4cb2dcf2aae9a3d4ea36f1bad5afd4

            • C:\ProgramData\bat\CreatLink.bat

              Filesize

              642B

              MD5

              8b97ac0cd9c3fb87baaeeaff3371a578

              SHA1

              96deebb464befc1fe5c4b36e20c67a978577e0c6

              SHA256

              e840947f5753c8864d50dd6107748f0904708a508db36ee783977a94fc9c1146

              SHA512

              81a60460bcf7681ca783a0a21a911d66b6e4ae842bdf4e510dd08446e5a28b21af5dada085eebee114e33bef8b6834694c4cb2dcf2aae9a3d4ea36f1bad5afd4

            • C:\ProgramData\winnt\local.exe

              Filesize

              65KB

              MD5

              dbbb4f5cff1ab1ab90e89ab0dcf5e923

              SHA1

              b983d2eff7b1e2982c3287599b14d68aebfd5e76

              SHA256

              9d58849233a0d299d78c5c86c2f5d68400df40e9b49d9c50aa873682ce8ade10

              SHA512

              a1244153f68fb0f71dc008baffc382e2be6c661d53634b01a704afa5f870ccf127c8988581be129743407b2aff878603f655eed64065e3909458d84bb0067229

            • C:\ProgramData\winnt\local.exe

              Filesize

              65KB

              MD5

              dbbb4f5cff1ab1ab90e89ab0dcf5e923

              SHA1

              b983d2eff7b1e2982c3287599b14d68aebfd5e76

              SHA256

              9d58849233a0d299d78c5c86c2f5d68400df40e9b49d9c50aa873682ce8ade10

              SHA512

              a1244153f68fb0f71dc008baffc382e2be6c661d53634b01a704afa5f870ccf127c8988581be129743407b2aff878603f655eed64065e3909458d84bb0067229

            • C:\ProgramData\winnt\local.exe

              Filesize

              65KB

              MD5

              dbbb4f5cff1ab1ab90e89ab0dcf5e923

              SHA1

              b983d2eff7b1e2982c3287599b14d68aebfd5e76

              SHA256

              9d58849233a0d299d78c5c86c2f5d68400df40e9b49d9c50aa873682ce8ade10

              SHA512

              a1244153f68fb0f71dc008baffc382e2be6c661d53634b01a704afa5f870ccf127c8988581be129743407b2aff878603f655eed64065e3909458d84bb0067229

            • C:\ProgramData\winnt\local.exe

              Filesize

              65KB

              MD5

              dbbb4f5cff1ab1ab90e89ab0dcf5e923

              SHA1

              b983d2eff7b1e2982c3287599b14d68aebfd5e76

              SHA256

              9d58849233a0d299d78c5c86c2f5d68400df40e9b49d9c50aa873682ce8ade10

              SHA512

              a1244153f68fb0f71dc008baffc382e2be6c661d53634b01a704afa5f870ccf127c8988581be129743407b2aff878603f655eed64065e3909458d84bb0067229

            • C:\ProgramData\winnt\music.exe

              Filesize

              145KB

              MD5

              4fc27c192b9f3403db66f4e76b90a6f0

              SHA1

              59f1e5e7534b96e16dbd64f90a7078b6fab41359

              SHA256

              1a91dc67cc0cdb8ba9b98fe7846609c2f3acdf950cb0b528cc58cdbf0f03c035

              SHA512

              e1b807267124b00ead18dbdbd157a0afe32e72a7e145717f194c8d9fe8aeb6a32186ce66ed4e035abc8d2e64b3d9fce4ef78ffb897d06d2e34a6961717145743

            • C:\ProgramData\winnt\music.exe

              Filesize

              145KB

              MD5

              4fc27c192b9f3403db66f4e76b90a6f0

              SHA1

              59f1e5e7534b96e16dbd64f90a7078b6fab41359

              SHA256

              1a91dc67cc0cdb8ba9b98fe7846609c2f3acdf950cb0b528cc58cdbf0f03c035

              SHA512

              e1b807267124b00ead18dbdbd157a0afe32e72a7e145717f194c8d9fe8aeb6a32186ce66ed4e035abc8d2e64b3d9fce4ef78ffb897d06d2e34a6961717145743

            • C:\Users\Admin\AppData\Local\Temp\{7975D166-B049-4b24-854E-F27E4C5513F2}.exe

              Filesize

              37KB

              MD5

              e474d14f686b0f44d193ea3c560249b5

              SHA1

              921da8d0be6a67c034e29e8861da7ea8067f1701

              SHA256

              a0539db7f385aa62eaf41c0f837345a9c7784a90c1a3b74f3c11d40017b8f38d

              SHA512

              8f6054e2717c9db45fe85626ef6786b2c758176ff2acefce867cbe0ac396e353a937c92f9bf326be180bcb77e17b4ac64ffb69023aaa910f42a8f4c198df353d

            • C:\Users\Admin\AppData\Local\Temp\{85A4F4FE-CFF2-44ce-A372-134C08DAB754}.exe

              Filesize

              37KB

              MD5

              e474d14f686b0f44d193ea3c560249b5

              SHA1

              921da8d0be6a67c034e29e8861da7ea8067f1701

              SHA256

              a0539db7f385aa62eaf41c0f837345a9c7784a90c1a3b74f3c11d40017b8f38d

              SHA512

              8f6054e2717c9db45fe85626ef6786b2c758176ff2acefce867cbe0ac396e353a937c92f9bf326be180bcb77e17b4ac64ffb69023aaa910f42a8f4c198df353d

            • C:\Users\Admin\AppData\Local\Temp\{85A4F4FE-CFF2-44ce-A372-134C08DAB754}.exe

              Filesize

              37KB

              MD5

              e474d14f686b0f44d193ea3c560249b5

              SHA1

              921da8d0be6a67c034e29e8861da7ea8067f1701

              SHA256

              a0539db7f385aa62eaf41c0f837345a9c7784a90c1a3b74f3c11d40017b8f38d

              SHA512

              8f6054e2717c9db45fe85626ef6786b2c758176ff2acefce867cbe0ac396e353a937c92f9bf326be180bcb77e17b4ac64ffb69023aaa910f42a8f4c198df353d

            • C:\Users\Admin\AppData\Local\Temp\{FD7558AC-A9A5-47b5-BB30-4952598CB221}.lnk

              Filesize

              1KB

              MD5

              d8faaac1b6bc05fd76d755285c4a35de

              SHA1

              fb69118b0e10ee5c498b39047b7bc587151381c6

              SHA256

              f04a981ec46101cba1ba33c23442ab0a9145e1c0190ac89fcb5dfa6fbf2f5044

              SHA512

              9ca0af38b718ddf43edccad77ce5f30f78c6b7f0b9021d170e9e93dc074df95c721e22dd962a8748ace117c7c9012a4e647f75a68dbb0e9f56b2b64b94ff46ef

            • C:\Users\Admin\AppData\Local\Temp\{FFFE279F-456D-430b-A169-8BCD875B9C9F}.lnk

              Filesize

              1KB

              MD5

              d8faaac1b6bc05fd76d755285c4a35de

              SHA1

              fb69118b0e10ee5c498b39047b7bc587151381c6

              SHA256

              f04a981ec46101cba1ba33c23442ab0a9145e1c0190ac89fcb5dfa6fbf2f5044

              SHA512

              9ca0af38b718ddf43edccad77ce5f30f78c6b7f0b9021d170e9e93dc074df95c721e22dd962a8748ace117c7c9012a4e647f75a68dbb0e9f56b2b64b94ff46ef

            • \ProgramData\winnt\local.exe

              Filesize

              65KB

              MD5

              dbbb4f5cff1ab1ab90e89ab0dcf5e923

              SHA1

              b983d2eff7b1e2982c3287599b14d68aebfd5e76

              SHA256

              9d58849233a0d299d78c5c86c2f5d68400df40e9b49d9c50aa873682ce8ade10

              SHA512

              a1244153f68fb0f71dc008baffc382e2be6c661d53634b01a704afa5f870ccf127c8988581be129743407b2aff878603f655eed64065e3909458d84bb0067229

            • \ProgramData\winnt\music.exe

              Filesize

              145KB

              MD5

              4fc27c192b9f3403db66f4e76b90a6f0

              SHA1

              59f1e5e7534b96e16dbd64f90a7078b6fab41359

              SHA256

              1a91dc67cc0cdb8ba9b98fe7846609c2f3acdf950cb0b528cc58cdbf0f03c035

              SHA512

              e1b807267124b00ead18dbdbd157a0afe32e72a7e145717f194c8d9fe8aeb6a32186ce66ed4e035abc8d2e64b3d9fce4ef78ffb897d06d2e34a6961717145743

            • \ProgramData\winnt\music.exe

              Filesize

              145KB

              MD5

              4fc27c192b9f3403db66f4e76b90a6f0

              SHA1

              59f1e5e7534b96e16dbd64f90a7078b6fab41359

              SHA256

              1a91dc67cc0cdb8ba9b98fe7846609c2f3acdf950cb0b528cc58cdbf0f03c035

              SHA512

              e1b807267124b00ead18dbdbd157a0afe32e72a7e145717f194c8d9fe8aeb6a32186ce66ed4e035abc8d2e64b3d9fce4ef78ffb897d06d2e34a6961717145743

            • \Users\Admin\AppData\Local\Temp\{7975D166-B049-4b24-854E-F27E4C5513F2}.exe

              Filesize

              37KB

              MD5

              e474d14f686b0f44d193ea3c560249b5

              SHA1

              921da8d0be6a67c034e29e8861da7ea8067f1701

              SHA256

              a0539db7f385aa62eaf41c0f837345a9c7784a90c1a3b74f3c11d40017b8f38d

              SHA512

              8f6054e2717c9db45fe85626ef6786b2c758176ff2acefce867cbe0ac396e353a937c92f9bf326be180bcb77e17b4ac64ffb69023aaa910f42a8f4c198df353d

            • \Users\Admin\AppData\Local\Temp\{85A4F4FE-CFF2-44ce-A372-134C08DAB754}.exe

              Filesize

              37KB

              MD5

              e474d14f686b0f44d193ea3c560249b5

              SHA1

              921da8d0be6a67c034e29e8861da7ea8067f1701

              SHA256

              a0539db7f385aa62eaf41c0f837345a9c7784a90c1a3b74f3c11d40017b8f38d

              SHA512

              8f6054e2717c9db45fe85626ef6786b2c758176ff2acefce867cbe0ac396e353a937c92f9bf326be180bcb77e17b4ac64ffb69023aaa910f42a8f4c198df353d

            • memory/1204-56-0x0000000002A60000-0x0000000002B69000-memory.dmp

              Filesize

              1.0MB

            • memory/1204-57-0x0000000010000000-0x000000001010C000-memory.dmp

              Filesize

              1.0MB

            • memory/1604-105-0x0000000000400000-0x0000000000411000-memory.dmp

              Filesize

              68KB

            • memory/1644-147-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1644-152-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1644-153-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1644-155-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1644-156-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1772-144-0x0000000000400000-0x0000000000411000-memory.dmp

              Filesize

              68KB

            • memory/1988-138-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1988-140-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1988-136-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1988-142-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB

            • memory/1988-94-0x0000000001F60000-0x0000000001FA1000-memory.dmp

              Filesize

              260KB

            • memory/1988-131-0x0000000010000000-0x0000000010048000-memory.dmp

              Filesize

              288KB