Analysis

  • max time kernel
    124s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2023 07:03

General

  • Target

    e57d05f1d9b076exeexeexeex.exe

  • Size

    299KB

  • MD5

    e57d05f1d9b07674e3a405788e4e05e4

  • SHA1

    681ac82cf9e309b425e104cdd8b43bf990c59625

  • SHA256

    523b7d0cbdf580c3661dda9e5bf1ac5a93b4735fd43b52d442e0c66e0125c5ec

  • SHA512

    71272d245ecb391a0e37fb3c987d75df530dcadf260c21db85a14131c25d9c78f7dcf7824a1766ab9f082bf0bcb8035602a09337cddc17b744fd934c46b5df40

  • SSDEEP

    3072:vzrM871SlQaBEE4qbIsGLdZ4aGTn06dmUK8Ykvcyyo1XTDU5W/aUQ5HnVfajZMzn:vTRSlv4nsGLtGTnX26TywQhhL9atzyW

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e57d05f1d9b076exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\e57d05f1d9b076exeexeexeex.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\XIgAEckY\zugAMscc.exe
      "C:\Users\Admin\XIgAEckY\zugAMscc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /FI "USERNAME eq Admin" /F /IM vcoUYQos.exe
        3⤵
        • Kills process with taskkill
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
    • C:\ProgramData\qGgwwgcI\vcoUYQos.exe
      "C:\ProgramData\qGgwwgcI\vcoUYQos.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:648
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /FI "USERNAME eq Admin" /F /IM zugAMscc.exe
        3⤵
        • Kills process with taskkill
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\calc_ovl_avx_clear_pattern.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\calc_ovl_avx_clear_pattern.exe
        C:\Users\Admin\AppData\Local\Temp\calc_ovl_avx_clear_pattern.exe
        3⤵
        • Executes dropped EXE
        PID:932
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:4796
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:1256
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\qGgwwgcI\vcoUYQos.exe

    Filesize

    182KB

    MD5

    8d5711e0c447135d876e09f6a858c988

    SHA1

    fe492fdf3dd69d6d34110cc735800b07ebde2c38

    SHA256

    36038534fe58a2f6681be00ee2b2a4f98cb8f0d85b1d0f909af8468177deaf6b

    SHA512

    b0280a880ae38c0a6e945e43a576767092ff50757fa38dfc7a003e505167e4dc6647a43a9ca83f32dc86fd7a86540611899fdf5a7acd50e57e8a687e1314d56f

  • C:\ProgramData\qGgwwgcI\vcoUYQos.exe

    Filesize

    182KB

    MD5

    8d5711e0c447135d876e09f6a858c988

    SHA1

    fe492fdf3dd69d6d34110cc735800b07ebde2c38

    SHA256

    36038534fe58a2f6681be00ee2b2a4f98cb8f0d85b1d0f909af8468177deaf6b

    SHA512

    b0280a880ae38c0a6e945e43a576767092ff50757fa38dfc7a003e505167e4dc6647a43a9ca83f32dc86fd7a86540611899fdf5a7acd50e57e8a687e1314d56f

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    5b8d27910d4e81f8550e812b64098d11

    SHA1

    876d09ad936ec6e8f449ca5edf52c4d54d66ec2e

    SHA256

    d98159852f6e104786d12334c38f3c6c1eb1f8bd75075c23ff7992a8b7048169

    SHA512

    c58430e36dbe8711107a93d06605058bfb14e575874a495cd06aba516420f970d7a873e6325f4efc3ac60434aff92700101b4a8f83a9b4d828a661082f9aa5f8

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    b117dc3cb8928a53ce4b445ec4860d71

    SHA1

    6876d105ec3617c538737acd673b4b70c96d8f9e

    SHA256

    7b6bfb6f17bb488d44625a23e64efaafa1b087474f136a08af3e44a7b18b89d0

    SHA512

    27b2f28861724693363bd713b2b0bd065c1b91d5cd16d9042076fa771949b94d01bc4d5be45a4941cf8a3949834ef4b36b95dd0d1efaf8565813477fcc20909c

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    79da3bdcac07f9d15252af212b77c5a8

    SHA1

    6c4710464f923d7f650a52162eccfbf60b1ab663

    SHA256

    17e41ef5d3e66dc5a60bd1424d6d1c3d8026687e3576ec5064f1f7cbf5c47476

    SHA512

    556d37ab2e392d2388864a202edb7b86b466f540f4fff3daac0aef0b028911fe272baf9ee46b927fb4a064f2a96d5ab0ef37540b24d3161b4f7dbc479daa81f1

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    e493d6b6b7ec2ca8583c4530963e999d

    SHA1

    5551217a223d276b3e92aeaf7125d10712a77f19

    SHA256

    57a4460926d5101f53aeaabffb6f4bd3a3bfe74d33096164ebe0f267fb18f014

    SHA512

    3e546301de5b1817a98d78a70de5886bc1ce492372d964fd5d97fa8ad22e0c438841ac7b86da4189ca0baddae59beac8c2bf4055cc567896457e2fcce976804c

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    29d0c33bd00d8a9c68d6911dad479588

    SHA1

    02a3a3a929c5ea56345661f10edec3bb5d1c0b26

    SHA256

    f9c8349dffb3ab643dd0c2dadf8a4fd60c6340a02b8b96f4d5dae54e3fd9b78e

    SHA512

    8d4d9209294063da1929f790b91f5a984e2ebcb3a11755dee04e793bf55ad074ad2f122dd4c97d9c06917ce0fbc6b28e7f4485fe4538f97ad0db1c07fc2e9343

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    20613940a7033fdf51fb8443a0a3fcbe

    SHA1

    da88c535e1dc80d1e11420914896d29ba0406f2c

    SHA256

    e466c55db54bb31ee8bc763fd26ebc76eaa0054c9b5553cd2b53f41efd420ce1

    SHA512

    71247c97c736e5d7db33d3914b2f310932e5af3d384f5a87916eb4b410f3163f739fff4810cdc0154d397be864f47979ebaf23661b620567f0ba0a44b97326e9

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    3face9a6a57aaf2f39035701d0181dbc

    SHA1

    c754374478dd18804171b215a12a9991536fc1b7

    SHA256

    1f8ab580d607673e569e09957216aab267e9a8f272185178e0b8e12b744be7cd

    SHA512

    33038023ab7dc38a7bfdc1faf22aa3ad65f5aee8b4bdd29056e17512473daf9a6816c6debbd73c770e64bc703711389746f2cc2f0795e01c763f8013f34f388d

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    d34f7e25d0fc654e23ceb86eef07d7df

    SHA1

    53b1d796227953a5591dd0878a677a5f6cbbb714

    SHA256

    705bd30eb42af504166972bfbc05f6e6c86863778ccf4930c415db21e97ceb68

    SHA512

    78c753ea476924184a482458b1e6d197b32421591859abe8fbb95e9b77dea9b94e83a431d4e6b5b5c9e411f8a31df1fe8e13b9e12844907d3ce10c02f73171f7

  • C:\ProgramData\qGgwwgcI\vcoUYQos.inf

    Filesize

    4B

    MD5

    457656bab26f0f07ee614d3f68d77fbf

    SHA1

    447731efdfd38c06bf8999ad179e492c2c25c965

    SHA256

    b5945264a5f23fa2a7aea86e7315d1064543900a4724c0d59d986e67e15f4a99

    SHA512

    21cc3c34d6037789e334ad08737eb36389e168356804c0d181dec22ee49a25992b4f7de79ac3296c421c7763c8d822d216a66c68f7bac8bf2c6c3aefa381b6ec

  • C:\Users\Admin\AppData\Local\Temp\calc_ovl_avx_clear_pattern.exe

    Filesize

    116KB

    MD5

    14260726256d54de6ccb2eff1003c05c

    SHA1

    073c85b1d5dade530694ef00543698f16d39fd45

    SHA256

    3970359aee5c8cb9451c2c84ae6d4c859999a40ae955d8ade9abacba215a087a

    SHA512

    8bf2d18c0bc4cb42af52ff223199f3504caf73e99fd49dd489306d79364c57d2b5d61039d83cebf898aedc825ab52397613b498aa49b6714fb4fe485112b7d7d

  • C:\Users\Admin\AppData\Local\Temp\calc_ovl_avx_clear_pattern.exe

    Filesize

    116KB

    MD5

    14260726256d54de6ccb2eff1003c05c

    SHA1

    073c85b1d5dade530694ef00543698f16d39fd45

    SHA256

    3970359aee5c8cb9451c2c84ae6d4c859999a40ae955d8ade9abacba215a087a

    SHA512

    8bf2d18c0bc4cb42af52ff223199f3504caf73e99fd49dd489306d79364c57d2b5d61039d83cebf898aedc825ab52397613b498aa49b6714fb4fe485112b7d7d

  • C:\Users\Admin\XIgAEckY\zugAMscc.exe

    Filesize

    184KB

    MD5

    7b478ba9255691fbc0c037221c10c8e0

    SHA1

    089990e1f2891752846f2318116785a7088ace55

    SHA256

    5b95c9140afdc2f098a8561b681ed10a6efbc003055e8200cc5b4b7144f61fd7

    SHA512

    bb7dee4d396c6dc7cafa290bc35136277d59d8206930a59efac6f2cbd0e032aa4f235d347193d2d2ca92f1312299adb24125637c645b9fe147d082c8629044da

  • C:\Users\Admin\XIgAEckY\zugAMscc.exe

    Filesize

    184KB

    MD5

    7b478ba9255691fbc0c037221c10c8e0

    SHA1

    089990e1f2891752846f2318116785a7088ace55

    SHA256

    5b95c9140afdc2f098a8561b681ed10a6efbc003055e8200cc5b4b7144f61fd7

    SHA512

    bb7dee4d396c6dc7cafa290bc35136277d59d8206930a59efac6f2cbd0e032aa4f235d347193d2d2ca92f1312299adb24125637c645b9fe147d082c8629044da

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    5b8d27910d4e81f8550e812b64098d11

    SHA1

    876d09ad936ec6e8f449ca5edf52c4d54d66ec2e

    SHA256

    d98159852f6e104786d12334c38f3c6c1eb1f8bd75075c23ff7992a8b7048169

    SHA512

    c58430e36dbe8711107a93d06605058bfb14e575874a495cd06aba516420f970d7a873e6325f4efc3ac60434aff92700101b4a8f83a9b4d828a661082f9aa5f8

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    b117dc3cb8928a53ce4b445ec4860d71

    SHA1

    6876d105ec3617c538737acd673b4b70c96d8f9e

    SHA256

    7b6bfb6f17bb488d44625a23e64efaafa1b087474f136a08af3e44a7b18b89d0

    SHA512

    27b2f28861724693363bd713b2b0bd065c1b91d5cd16d9042076fa771949b94d01bc4d5be45a4941cf8a3949834ef4b36b95dd0d1efaf8565813477fcc20909c

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    79da3bdcac07f9d15252af212b77c5a8

    SHA1

    6c4710464f923d7f650a52162eccfbf60b1ab663

    SHA256

    17e41ef5d3e66dc5a60bd1424d6d1c3d8026687e3576ec5064f1f7cbf5c47476

    SHA512

    556d37ab2e392d2388864a202edb7b86b466f540f4fff3daac0aef0b028911fe272baf9ee46b927fb4a064f2a96d5ab0ef37540b24d3161b4f7dbc479daa81f1

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    e493d6b6b7ec2ca8583c4530963e999d

    SHA1

    5551217a223d276b3e92aeaf7125d10712a77f19

    SHA256

    57a4460926d5101f53aeaabffb6f4bd3a3bfe74d33096164ebe0f267fb18f014

    SHA512

    3e546301de5b1817a98d78a70de5886bc1ce492372d964fd5d97fa8ad22e0c438841ac7b86da4189ca0baddae59beac8c2bf4055cc567896457e2fcce976804c

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    29d0c33bd00d8a9c68d6911dad479588

    SHA1

    02a3a3a929c5ea56345661f10edec3bb5d1c0b26

    SHA256

    f9c8349dffb3ab643dd0c2dadf8a4fd60c6340a02b8b96f4d5dae54e3fd9b78e

    SHA512

    8d4d9209294063da1929f790b91f5a984e2ebcb3a11755dee04e793bf55ad074ad2f122dd4c97d9c06917ce0fbc6b28e7f4485fe4538f97ad0db1c07fc2e9343

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    20613940a7033fdf51fb8443a0a3fcbe

    SHA1

    da88c535e1dc80d1e11420914896d29ba0406f2c

    SHA256

    e466c55db54bb31ee8bc763fd26ebc76eaa0054c9b5553cd2b53f41efd420ce1

    SHA512

    71247c97c736e5d7db33d3914b2f310932e5af3d384f5a87916eb4b410f3163f739fff4810cdc0154d397be864f47979ebaf23661b620567f0ba0a44b97326e9

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    3face9a6a57aaf2f39035701d0181dbc

    SHA1

    c754374478dd18804171b215a12a9991536fc1b7

    SHA256

    1f8ab580d607673e569e09957216aab267e9a8f272185178e0b8e12b744be7cd

    SHA512

    33038023ab7dc38a7bfdc1faf22aa3ad65f5aee8b4bdd29056e17512473daf9a6816c6debbd73c770e64bc703711389746f2cc2f0795e01c763f8013f34f388d

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    d34f7e25d0fc654e23ceb86eef07d7df

    SHA1

    53b1d796227953a5591dd0878a677a5f6cbbb714

    SHA256

    705bd30eb42af504166972bfbc05f6e6c86863778ccf4930c415db21e97ceb68

    SHA512

    78c753ea476924184a482458b1e6d197b32421591859abe8fbb95e9b77dea9b94e83a431d4e6b5b5c9e411f8a31df1fe8e13b9e12844907d3ce10c02f73171f7

  • C:\Users\Admin\XIgAEckY\zugAMscc.inf

    Filesize

    4B

    MD5

    457656bab26f0f07ee614d3f68d77fbf

    SHA1

    447731efdfd38c06bf8999ad179e492c2c25c965

    SHA256

    b5945264a5f23fa2a7aea86e7315d1064543900a4724c0d59d986e67e15f4a99

    SHA512

    21cc3c34d6037789e334ad08737eb36389e168356804c0d181dec22ee49a25992b4f7de79ac3296c421c7763c8d822d216a66c68f7bac8bf2c6c3aefa381b6ec

  • memory/648-155-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/648-201-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1184-154-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1184-200-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1792-148-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/1792-133-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB