Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 18:22

General

  • Target

    79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

  • Size

    2.3MB

  • MD5

    2572c890776f92894c0e45f971de9f0b

  • SHA1

    cc93bea092bcd70d4fe0b6d3d283f1fbea847bde

  • SHA256

    79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d

  • SHA512

    f18798d75fc90efb671eec96fb821d2c52ab1e8a96ee053bd593ab4507d6bc2cc61cbc88c84b2f8081e501a02cff17dc5eb2239d02be4b63883db12bc9245840

  • SSDEEP

    49152:YrS/CzXaWG55+ovfGYqEAf8RlPMJlio68D:YrYCraWG55+ovfGYqEAf8RlPlo68

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe
    "C:\Users\Admin\AppData\Local\Temp\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe
      "C:\Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Windows\SysWOW64\subst.exe
        "C:\Windows\System32\subst.exe" C: /D
        3⤵
          PID:1140
        • C:\Windows\SysWOW64\subst.exe
          "C:\Windows\System32\subst.exe" D: /D
          3⤵
            PID:1916
          • C:\Windows\SysWOW64\subst.exe
            "C:\Windows\System32\subst.exe" E: /D
            3⤵
              PID:1532
            • C:\Windows\SysWOW64\subst.exe
              "C:\Windows\System32\subst.exe" F: /D
              3⤵
                PID:1556
              • C:\Windows\SysWOW64\subst.exe
                "C:\Windows\System32\subst.exe" G: /D
                3⤵
                  PID:1280
                • C:\Windows\SysWOW64\subst.exe
                  "C:\Windows\System32\subst.exe" H: /D
                  3⤵
                    PID:1932
                  • C:\Windows\SysWOW64\subst.exe
                    "C:\Windows\System32\subst.exe" I: /D
                    3⤵
                      PID:1020
                    • C:\Windows\SysWOW64\subst.exe
                      "C:\Windows\System32\subst.exe" J: /D
                      3⤵
                        PID:316
                      • C:\Windows\SysWOW64\subst.exe
                        "C:\Windows\System32\subst.exe" K: /D
                        3⤵
                          PID:1892
                        • C:\Windows\SysWOW64\subst.exe
                          "C:\Windows\System32\subst.exe" L: /D
                          3⤵
                            PID:1460
                          • C:\Windows\SysWOW64\subst.exe
                            "C:\Windows\System32\subst.exe" M: /D
                            3⤵
                              PID:1396
                            • C:\Windows\SysWOW64\subst.exe
                              "C:\Windows\System32\subst.exe" N: /D
                              3⤵
                                PID:528
                              • C:\Windows\SysWOW64\subst.exe
                                "C:\Windows\System32\subst.exe" O: /D
                                3⤵
                                  PID:1800
                                • C:\Windows\SysWOW64\subst.exe
                                  "C:\Windows\System32\subst.exe" P: /D
                                  3⤵
                                    PID:1448
                                  • C:\Windows\SysWOW64\subst.exe
                                    "C:\Windows\System32\subst.exe" Q: /D
                                    3⤵
                                      PID:1424
                                    • C:\Windows\SysWOW64\subst.exe
                                      "C:\Windows\System32\subst.exe" R: /D
                                      3⤵
                                        PID:1224
                                      • C:\Windows\SysWOW64\subst.exe
                                        "C:\Windows\System32\subst.exe" S: /D
                                        3⤵
                                          PID:1832
                                        • C:\Windows\SysWOW64\subst.exe
                                          "C:\Windows\System32\subst.exe" T: /D
                                          3⤵
                                            PID:1176
                                          • C:\Windows\SysWOW64\subst.exe
                                            "C:\Windows\System32\subst.exe" U: /D
                                            3⤵
                                              PID:1612
                                            • C:\Windows\SysWOW64\subst.exe
                                              "C:\Windows\System32\subst.exe" V: /D
                                              3⤵
                                                PID:2028
                                              • C:\Windows\SysWOW64\subst.exe
                                                "C:\Windows\System32\subst.exe" W: /D
                                                3⤵
                                                  PID:1072
                                                • C:\Windows\SysWOW64\subst.exe
                                                  "C:\Windows\System32\subst.exe" X: /D
                                                  3⤵
                                                    PID:1132
                                                  • C:\Windows\SysWOW64\subst.exe
                                                    "C:\Windows\System32\subst.exe" Y: /D
                                                    3⤵
                                                      PID:576
                                                    • C:\Windows\SysWOW64\subst.exe
                                                      "C:\Windows\System32\subst.exe" Z: /D
                                                      3⤵
                                                        PID:1856

                                                  Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • C:\Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • C:\Program Files (x86)\xjkSet_220605\api2xxx_dll_M.dll

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    ff1c75cd32367a44baba026c6e65d237

                                                    SHA1

                                                    a89c7f1a61a4d88fcd06d6a261534fbfd1d12020

                                                    SHA256

                                                    792f847ac258fdfa929a7bcce0c7d8e3653e6cbe8814b5fdb047235e798a9f35

                                                    SHA512

                                                    4d5866c40f9d69bcbea061f46790d7bc7fc3379cc8a2609bab7bdb88d75e0f8bfe7d908a2ce28e4de411c179fdfd84052bf043bdf0be311c95be92887f167a5a

                                                  • \Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • \Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • \Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • \Program Files (x86)\xjkSet_220605\79a4615df5fc5115056d6cd748d70490cf81322629b753ad26864e4a29b75e9d.exe

                                                    Filesize

                                                    300KB

                                                    MD5

                                                    5ff996cd94bec3ea22f8f1fc902029cf

                                                    SHA1

                                                    a75f6a96b4be036699eebbdff84cdae2c5de84a8

                                                    SHA256

                                                    d11446931035181c951a5b853f44c82c27d653185e7edee0c2de518abdb3945f

                                                    SHA512

                                                    396eb61ea00139355faac12c378765f8dc67af025c879f5e6538218c2115217f01139315467ecd9c6c50414f10c211d7c1963c246a80247f3320180f06790fe7

                                                  • \Program Files (x86)\xjkSet_220605\api2xxx_dll_M.dll

                                                    Filesize

                                                    1.8MB

                                                    MD5

                                                    ff1c75cd32367a44baba026c6e65d237

                                                    SHA1

                                                    a89c7f1a61a4d88fcd06d6a261534fbfd1d12020

                                                    SHA256

                                                    792f847ac258fdfa929a7bcce0c7d8e3653e6cbe8814b5fdb047235e798a9f35

                                                    SHA512

                                                    4d5866c40f9d69bcbea061f46790d7bc7fc3379cc8a2609bab7bdb88d75e0f8bfe7d908a2ce28e4de411c179fdfd84052bf043bdf0be311c95be92887f167a5a