Analysis

  • max time kernel
    374s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20230220-es
  • resource tags

    arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    13-06-2023 15:00

General

  • Target

    m.zip

  • Size

    13.6MB

  • MD5

    f34e3c08014af15902e7afa304c13b35

  • SHA1

    582f2aec6a27f5eacaea69d083f7bf52dfc763d9

  • SHA256

    19d9dba639a3edcdd165e2c2479bc9dfc6e45d35a6f71482bf5d0282f094dd7e

  • SHA512

    580c2d3fa30e7b353900236577feb437584091a0e827eae4ce48e35364acda3d43d551dc671e5efd189f6afe9bf5b834a9477d195b0c879ff4b83807688598e5

  • SSDEEP

    393216:GrfXDd/n6/DJqmL8goiKKlbKKBINpAphUyh7/ONvNY8:nAW8VlKl7IjArUQjk1j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\m.zip
    1⤵
      PID:1628
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1388
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x48c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:596
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\m\" -spe -an -ai#7zMap8072:60:7zEvent14916
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1504
      • C:\Users\Admin\Desktop\m\exe.exe
        "C:\Users\Admin\Desktop\m\exe.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:880
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        1⤵
          PID:240
        • C:\Users\Admin\Desktop\m\exe.exe
          "C:\Users\Admin\Desktop\m\exe.exe"
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1116
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
          1⤵
            PID:396
          • C:\Users\Admin\Desktop\m\exe.exe
            "C:\Users\Admin\Desktop\m\exe.exe"
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1676
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
            1⤵
              PID:1388
            • C:\Users\Admin\Desktop\m\exe.exe
              "C:\Users\Admin\Desktop\m\exe.exe"
              1⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Modifies registry class
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              PID:1900
            • C:\Windows\SysWOW64\DllHost.exe
              C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
              1⤵
                PID:804
              • C:\Windows\SysWOW64\DllHost.exe
                C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                1⤵
                  PID:1064
                • C:\Users\Admin\Desktop\m\exe.exe
                  "C:\Users\Admin\Desktop\m\exe.exe"
                  1⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies registry class
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  PID:1988
                • C:\Users\Admin\Desktop\m\exe.exe
                  "C:\Users\Admin\Desktop\m\exe.exe"
                  1⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  PID:1872
                • C:\Windows\SysWOW64\DllHost.exe
                  C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                  1⤵
                    PID:1700
                  • C:\Users\Admin\Desktop\m\exe.exe
                    "C:\Users\Admin\Desktop\m\exe.exe"
                    1⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of SetWindowsHookEx
                    PID:1204
                  • C:\Windows\SysWOW64\DllHost.exe
                    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                    1⤵
                      PID:1900

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\Desktop\m\6.txt

                      Filesize

                      8.7MB

                      MD5

                      ae7b21832a400ae3927240b73bf07c96

                      SHA1

                      1b949d57c5813a4557ea850ce5dfc21388bfa96d

                      SHA256

                      66b702fdf5793a20cecb9c969fd96c48bb0cedafd89ddfa3946c646c564b497a

                      SHA512

                      32ad2b935659d1d9c10e050687858d87dd3dbd53191e4333967c5efcb739ec6d589285f251d2228dc6d7e8e96f594c2e457f667d2e8a60058bbbcaa8d5d4c833

                    • C:\Users\Admin\Desktop\m\WebView2Loader.dll

                      Filesize

                      105KB

                      MD5

                      61e6b94ab6109254fbef360681f5b80d

                      SHA1

                      204a5eda5fea33a56edb33b9ccd40af635a04564

                      SHA256

                      446b4d19ed8fa1563b77a7f36261b76911b208af1d00a805d54e44b01ca3f54a

                      SHA512

                      93fad29f13c0a18e4864ddf57aeba882fb411b84f6dff993b87295a1b5e4b488433802c2150fbf25a3132379dc2eb3aa02d836059b0ef24a2db4269eb0795a9b

                    • C:\Users\Admin\Desktop\m\at.txt

                      Filesize

                      4.4MB

                      MD5

                      4550ed72138e596c4e606c4b083fc048

                      SHA1

                      af377ea2feb2e24e379a44206a171312e7c0c5a0

                      SHA256

                      221ac98bf9a883a60bd5831726c5daea1987966d650387bd333d01a05640118b

                      SHA512

                      1541040ed1f166bbed11db11ed494c333fde8b99b0dd61a057321bf6da9d36f125d02c202e63ce4e985337c68d589fddb0bcc1dbf167acd8ad737dd4c19e8d51

                    • C:\Users\Admin\Desktop\m\b.txt

                      Filesize

                      23KB

                      MD5

                      972e06af4e9ac72ad421c3b85ca264a1

                      SHA1

                      96fdad30bee5a89038b4af1c6bda02a78edf4901

                      SHA256

                      2042227bdec035383987660e468a6aaa9efd5582aa011c26e2ee9f7b269a21f7

                      SHA512

                      db2c645d318882dae58ab182d2de29f146ec258f46a19c5abb702bb566c15817421da36f6ef2aa71c9754c26958a1682988e72564bab8e4e6d3bf54382b56553

                    • C:\Users\Admin\Desktop\m\c.txt

                      Filesize

                      23KB

                      MD5

                      865d7f5b2e4e263030b3cf74cc577ec9

                      SHA1

                      946524700dc39fda45d0926ea7c1b7327a0870d6

                      SHA256

                      371834d608526e3f2bb69e08fcbb9fb1d4b82535732f6e6191b6d189c35bbd59

                      SHA512

                      640b02b598825011baa5dcee1384667ea0e176cad0153867972f7706e733e2013121e63b20bde5e27273e44ad1390b06bedc1578ef04418d19f358dd892b5cea

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • C:\Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • \Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • \Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • \Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • \Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • \Users\Admin\Desktop\m\exe.exe

                      Filesize

                      872KB

                      MD5

                      c56b5f0201a3b3de53e561fe76912bfd

                      SHA1

                      2a4062e10a5de813f5688221dbeb3f3ff33eb417

                      SHA256

                      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                      SHA512

                      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                    • memory/880-69-0x0000000004260000-0x0000000004261000-memory.dmp

                      Filesize

                      4KB

                    • memory/880-68-0x0000000004740000-0x0000000004742000-memory.dmp

                      Filesize

                      8KB

                    • memory/880-67-0x0000000004260000-0x0000000004261000-memory.dmp

                      Filesize

                      4KB

                    • memory/1116-82-0x0000000003E90000-0x0000000003E91000-memory.dmp

                      Filesize

                      4KB

                    • memory/1116-80-0x0000000004700000-0x0000000004702000-memory.dmp

                      Filesize

                      8KB

                    • memory/1116-79-0x0000000003E90000-0x0000000003E91000-memory.dmp

                      Filesize

                      4KB

                    • memory/1204-104-0x00000000042A0000-0x00000000042A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1204-101-0x00000000042A0000-0x00000000042A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1676-85-0x0000000004270000-0x0000000004271000-memory.dmp

                      Filesize

                      4KB

                    • memory/1676-86-0x00000000046A0000-0x00000000046A2000-memory.dmp

                      Filesize

                      8KB

                    • memory/1872-98-0x0000000004260000-0x0000000004262000-memory.dmp

                      Filesize

                      8KB

                    • memory/1872-99-0x0000000003E10000-0x0000000003E11000-memory.dmp

                      Filesize

                      4KB

                    • memory/1900-91-0x0000000004240000-0x0000000004241000-memory.dmp

                      Filesize

                      4KB

                    • memory/1900-90-0x0000000004250000-0x0000000004252000-memory.dmp

                      Filesize

                      8KB

                    • memory/1900-89-0x0000000004240000-0x0000000004241000-memory.dmp

                      Filesize

                      4KB

                    • memory/1988-94-0x0000000004260000-0x0000000004261000-memory.dmp

                      Filesize

                      4KB

                    • memory/1988-96-0x0000000004260000-0x0000000004261000-memory.dmp

                      Filesize

                      4KB

                    • memory/1988-93-0x00000000042B0000-0x00000000042B2000-memory.dmp

                      Filesize

                      8KB