Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 18:12

General

  • Target

    Pivnoxybggcadheda28_browsingExe.exe

  • Size

    160KB

  • MD5

    4bc743b0f4090cdd0c0fbcebfa996de9

  • SHA1

    1bbde685776cd633786d78ebdebd3f077fe82448

  • SHA256

    9f93a50cadd762d36788ce1c8d5deb2d26e109f717f3e2d4d5c8f0d3344de725

  • SHA512

    3c896870985a1af9d25151495e96e709e75afd1bc42fdf526bd4ef428393805a5dea2032fb6aa8491fbfa660a9d88cc4fdfce564d440b1d8ca57ee6485b5d884

  • SSDEEP

    3072:6yoHBBC3ueOa7Wigo11C0m3+qN6AiWSvDxX4WyB:6dPCv97W2gf+C6vVt4Wy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pivnoxybggcadheda28_browsingExe.exe
    "C:\Users\Admin\AppData\Local\Temp\Pivnoxybggcadheda28_browsingExe.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\confax.exe
      C:\Users\Admin\AppData\Local\Temp\confax.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\heguv.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 12
          4⤵
          • Runs ping.exe
          PID:4264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LBTServ.dll

    Filesize

    168KB

    MD5

    87340ff500e114399e046b0f14f294c4

    SHA1

    1b5ae33cb87070e4e96195a8c76a8cdbf039d983

    SHA256

    0fd13b231be06cfa0007d9592fb5438bc629ebbf40ba733c714fca9e89791851

    SHA512

    69bc71b36c308d7b79697d3e21d30a24e3684c5fb5c8346f40ee8e1f51d3f1a01b935dd5cb44164b27bc832a040b26a0ec5ee4977edb64ce60cdd935a76d0f42

  • C:\Users\Admin\AppData\Local\Temp\LBTServ.dll

    Filesize

    168KB

    MD5

    87340ff500e114399e046b0f14f294c4

    SHA1

    1b5ae33cb87070e4e96195a8c76a8cdbf039d983

    SHA256

    0fd13b231be06cfa0007d9592fb5438bc629ebbf40ba733c714fca9e89791851

    SHA512

    69bc71b36c308d7b79697d3e21d30a24e3684c5fb5c8346f40ee8e1f51d3f1a01b935dd5cb44164b27bc832a040b26a0ec5ee4977edb64ce60cdd935a76d0f42

  • C:\Users\Admin\AppData\Local\Temp\confax.exe

    Filesize

    53KB

    MD5

    ff992b4aa59884ad153c887fbb7155fc

    SHA1

    7897ae73e8ad10548e4828a4b45a798b5472323d

    SHA256

    7aadcb53ca413648eba86d01490038d4c0763bceb5875abceb10da12d4d6a2dd

    SHA512

    ce9ec7931fc5c7ab47c42a105c96e823fe3ab1c8b1a8916661501c47bec5b04901e55c152ac87531e03d3733c878397c869bee6ab3c1927fb68869e897fbba3a

  • C:\Users\Admin\AppData\Local\Temp\confax.exe

    Filesize

    53KB

    MD5

    ff992b4aa59884ad153c887fbb7155fc

    SHA1

    7897ae73e8ad10548e4828a4b45a798b5472323d

    SHA256

    7aadcb53ca413648eba86d01490038d4c0763bceb5875abceb10da12d4d6a2dd

    SHA512

    ce9ec7931fc5c7ab47c42a105c96e823fe3ab1c8b1a8916661501c47bec5b04901e55c152ac87531e03d3733c878397c869bee6ab3c1927fb68869e897fbba3a

  • C:\Users\Admin\AppData\Local\Temp\heguv.cmd

    Filesize

    2KB

    MD5

    a339d0219b5f581eb503e5d245cbe39a

    SHA1

    7e06ca72c504ef2f2b666a39242ff0964a826873

    SHA256

    84c2521cfe485a2b2b26ba1992241d7fbdd684e150413277915abac11d2a8c44

    SHA512

    a80a42401a11cf2e0ec916fcbe1ab345cc3cb92a2e072d0818eef889307dc64a06fced53407fe17089402fd390176a5af65c0ad695777e293ef9916d761eb072

  • memory/924-141-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB

  • memory/924-144-0x0000000010000000-0x0000000010093000-memory.dmp

    Filesize

    588KB