Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 09:49

General

  • Target

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe

  • Size

    108KB

  • MD5

    7856c463dafa41e9ee8057c2a53b8f5f

  • SHA1

    414659752d234ea615756ebe527a18dceba408f6

  • SHA256

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984

  • SHA512

    cd947cc251a6b30b936bc2d056b152925a5c4e848c495b7f2b2a7da2278a4ef16b61603d2875a5f36999f784a22ec23b44b5b26449aed054f746b22d62455c5f

  • SSDEEP

    3072:7iQpRQqbfY7QRPVAziuhArAy72GRSQIrD:RRQqbfYePV6iuhAr5KGiD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 12 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 11 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
    "C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2260
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.ini.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2088
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec1.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2988
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\UpLog.txt.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:1260
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc.zip C:\Users\Admin\AppData\Local\Temp\inc\
      2⤵
      • Drops file in Windows directory
      PID:2224
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib.zip C:\Users\Admin\AppData\Local\Temp\inc\lib\
      2⤵
      • Drops file in Windows directory
      PID:608
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\code\crc32.sec.zip C:\Users\Admin\AppData\Local\Temp\code\
      2⤵
      • Drops file in Windows directory
      PID:1400
    • C:\Users\Admin\AppData\Local\Temp\Sec.exe
      Sec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:272

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Sec.exe

          Filesize

          108KB

          MD5

          dfa1023dace7cf6736ca42933f143761

          SHA1

          780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

          SHA256

          722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

          SHA512

          26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

        • C:\Users\Admin\AppData\Local\Temp\Sec.exe

          Filesize

          108KB

          MD5

          dfa1023dace7cf6736ca42933f143761

          SHA1

          780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

          SHA256

          722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

          SHA512

          26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

        • C:\Users\Admin\AppData\Local\Temp\Sec.ini

          Filesize

          180KB

          MD5

          dc71242c827305ef9608362bd8f7ae7f

          SHA1

          9cd2b8efd0a38c29fc309b1ca80a54cb1139998a

          SHA256

          08de077504ff3f9453e6dcd789c41feebaf24d335e9eec7f054a80faae63d2bc

          SHA512

          9bc733260dc4176bc5102a6b0a6d47857f065af28f6b752af576093e883cbdcc70a3fa5b80f9101a0d210fe8c80c9bfe969348d55ba7b95293cdc37a48f4e1b0

        • C:\Users\Admin\AppData\Local\Temp\Sec1.exe

          Filesize

          96KB

          MD5

          ce3d32362fb1c2e7fbba72cce95c3b0c

          SHA1

          a48c44ef67e0cf711733509e4233401f4f17380b

          SHA256

          76613df11b82f958b79783212b240701b12871db27a2050d32b4c6ae0d4dca1c

          SHA512

          d88e4b06893f7616a035f287c24115d666fc87d7319292a74534af0d29c7e2a8530b6da900266df43e47cb6224bfb7b4f1adba6dc5ad26ddf46dc7bda698ae93

        • C:\Users\Admin\AppData\Local\Temp\UpLog.txt

          Filesize

          28KB

          MD5

          ed0e0c142c05e3b4cb97929e8c045cf3

          SHA1

          734b648c9a6ab53a4eaba12668f545bdc0869212

          SHA256

          4f97c5f1be90b7cbed7bd3075561d09cb05cbb1e78d969fc06a152cbaac4f0d8

          SHA512

          efead23df6f778e0a02a991eaee164fd9cbe2d8638a317965367d30880e38fda6fce365e982109465d22eb7f8777b5f9c3d47088fb5f55a0129ee10d0f00d412

        • C:\Users\Admin\AppData\Local\Temp\code\crc32.sec

          Filesize

          1KB

          MD5

          b5413b8724dc740d100d83c5fb5474d6

          SHA1

          3d590964b543cc4fa5500fbff768fa2d0bf301de

          SHA256

          1acb643a84354be82518eece323c498c983236dd27001e9422c68d6c567cc65e

          SHA512

          b42f9b042db52e874b4e75f49fe90ba1a35573d734f8a43dc50c807129501821f263d8380b456cc4b0138c78519216ec64b3a356caac06fa393de195bd860b25

        • C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc

          Filesize

          1KB

          MD5

          5d089846fdf9551981b4caa959168746

          SHA1

          efd43083b8b0fe656ed2ec9034bb82c38d50c86a

          SHA256

          2be5e2ff8dbfd24e189219de350550aa429e85aab9161daadeb0a25f91124204

          SHA512

          d54ba11884a3ba0a70280578ab2a16a8f7b0c3bc33ddd4d6d17e8b20b00b407f6834c531270e2a6d4ea3d28e18e6bdeccd2d61af1079547fedf93674567dadfd

        • C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib

          Filesize

          14KB

          MD5

          28aa70c6d418cad7d09f72672682370b

          SHA1

          42f3903717183c6d6c7ab9d2d9b9cfe9c517dca6

          SHA256

          2c7c868dce813c91382b7d5d5414849019312abcd1996ee45946656f462b96e2

          SHA512

          15659d9b0225c2e6e02c02c771e8ae97568a415aa456217687e817fb8a92bb00f6c2afed245e83c2b78d7069aa310750f0cd4395f07a6fa086dde59d5859c539

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          10KB

          MD5

          bb47f93b97613095bb3a1342ffe2a7b4

          SHA1

          cf2f1c86f99b244c968c402757749dbf8de9dbc5

          SHA256

          764e502310c84f11943f247a64f3d2728eddfbcb4d4b4565e224f7629c924081

          SHA512

          d07c34021cec2848f0cbf1b387ec84de2b3fd9a0ea2ab9b76054c3397f65552b460d208dbafddb7184404d0eb74c4356f2ae21c33c06188d56eb8ca7385b3298

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          10KB

          MD5

          49725317ef3f5f2aebc2d4eacb5e1c4c

          SHA1

          e91d8ca9aa81ecbcf403176d45300f37fea37acf

          SHA256

          a7962c1fc9ea5655fe24e20e1f168a4dbcfd5e7d6419c97ef7e59e62bc6a219f

          SHA512

          7653dea8a09129b68f9963f13c554edb90d7a15d9b4f1d96daeca0886962783c5fae3810064c28b5dac175408f68ac13f981ce3d315a5e6eb08bf3bcb5866271

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          10KB

          MD5

          3567b2e9386a616ddaff6c5ce39e6e62

          SHA1

          e8fcd69a5ae79e68dd7f7617813166484d343782

          SHA256

          c3eb0259d16a10acaf71032a69335c1e825c25a91a5e3f29098bbfd278205c91

          SHA512

          89135a9e7ad8854fa6376d5190977946e71cf364c1f97c53e8e82665f58816fe43401cb8fafd8a44bff03661cb68c3b3bb25cc52240a7023df8b2bab363d38a9

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          6KB

          MD5

          5455f04434fd2228bc3644abd03e13ac

          SHA1

          15113018b5b824bd519d561720d31e40eb3d1602

          SHA256

          80ae383cf832d2c50f322f9cfef4f15e9f7ce70c78787b1fabf7ffbc455aa57f

          SHA512

          5488099db8f9e2ceafe197e5f23c0050e372ef5a4b9e2b1c1ca84e31e6bd8d7e44078aecc5ee259ebe9d95fb91926fa5c417a758bb174a784970b42a42588aa6

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          7KB

          MD5

          167451564ac805d409d0db766637071e

          SHA1

          ebacdd308e3c47bb26ddfc14b98076da8389fb8e

          SHA256

          2ff435c8421ed4950f6c74b548ae20cb24e37a1c1a72384fe383ee08d15df8fd

          SHA512

          7fc89cd5d3c2ddaa4310a97d3f8944bbcfc8e40991cd89d3a37a7805521a42a3ca2081e028538b273bd1554a8bda0d54018bb509462e6500399dad60fd093b18

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          8KB

          MD5

          07bf45a8cb0a1bcce881be63ffb645d6

          SHA1

          ab474b815884d5826bcca02fa25bc719ae8d87da

          SHA256

          111a37b8873be1d4d681b701a52463a2968fc0511c4eff051b6ee3c4220b61c9

          SHA512

          949b514c810a4a7c051e4bf174736ca83cc88c33e8dabff48cd1071ccbb01f9005c354bfbbd2aa827ea09b6fdb8c9ade41cf88cd002bd9d392decf622dfa7b35

        • C:\Windows\Logs\DPX\setupact.log

          Filesize

          9KB

          MD5

          0a54afceee09013832bc561fe634cce8

          SHA1

          c734362ab158a2c140622a9c29d864feff17c391

          SHA256

          3938c959c9b7ff96756c1e9fe80c458adfc5b8019885bc369dd5070496eca878

          SHA512

          617f5424de900c9072d6ca98276c2c0b075e014952725e0ca41eed37ae80b7e6f890b7fdb9d2f38fe2363b85f996b9327e19fa79480f0b7db92d4ab30d80f1f0

        • \??\c:\users\admin\appdata\local\temp\code\crc32.sec.zip

          Filesize

          29KB

          MD5

          9f79488a0f0832ba5621385bcdbe051e

          SHA1

          7464579e2ba57ffcbb54018141beadb3a075f244

          SHA256

          5c91cc63de571e770ba733fdfa3028544060085323733fce23201385016e5edf

          SHA512

          e8cb7ded1f169bf9c1c3fe408a1d7c2bbb5e6ef6351a9044830b2508cb70cfdb2546ab0f0ee38b731a1a3d046587ad04769c72d92cb0c53cfe07a61a79512881

        • \??\c:\users\admin\appdata\local\temp\inc\gui.inc.zip

          Filesize

          3KB

          MD5

          198419d819d8746e075c7c6dd4cc53ae

          SHA1

          abb10e479deb20ed13c153a241b8b9b70ad2fac2

          SHA256

          1f4d749d507f68ab6d970704dfffbcfc5d7a26f080adfe0541bfa5dda4b42669

          SHA512

          3057edd296a87a5b795a1190d6b7d849061d1e0075f5fd323de123e8229d039fe99b142ec30f7fb565b2f44aab2b235d1129872254f9a21e8c4283d35e3b2c6d

        • \??\c:\users\admin\appdata\local\temp\inc\lib\gdi32.lib.zip

          Filesize

          58KB

          MD5

          54860c094c7e7a8379665548641462d0

          SHA1

          9f1eaad74a62875d308f2a947946b756281210a9

          SHA256

          04b147dad1441b40fd76f6e2b6be5942bea7846740f0ed4f0cb307e032cb004c

          SHA512

          325793327e6137f8467e91e2f9a294ca3356e0885421cf8a9d2098bcddfd09af31a217de5c7a628d5f038aeb82dc9f4f68b9dd12cffcb12b2a763188926f40a6

        • \??\c:\users\admin\appdata\local\temp\sec.exe.zip

          Filesize

          93KB

          MD5

          4abd64e89f08637f7b5a09e664d5022f

          SHA1

          f0fb5640cbae362da5df7250d3b1fdf1f2c1f99e

          SHA256

          099681aa51fdd7bff43d36ad495e23e1403cfbb51869ca97b536a87fba8eb11c

          SHA512

          e5c7f749c4ae6d1282a224b2781f7a9e702fbbbdc8de150aa2042ee974d7f34f57cc99a0e6a10e363fbec2b69ab9a19037d2cb21ec181d49872d9e78eb4b173d

        • \??\c:\users\admin\appdata\local\temp\sec.ini.zip

          Filesize

          68KB

          MD5

          d501cd96aaba0649aacf8e36f4d23618

          SHA1

          ed87bf5ab1ffc115f82431ca82706e114742a572

          SHA256

          c5f4f979127e973f333b15b8bee09fa97125e25501aad7f2ad69568bd77e6d0d

          SHA512

          4a319ef1dc00f09a4566c324a318e87174fa96d6a322f59f4896db8048934236837493bf82abb1e8e45aacf2d4fb513c94daa2a1152b2a2bf6189dfa3834065e

        • \??\c:\users\admin\appdata\local\temp\sec1.exe.zip

          Filesize

          79KB

          MD5

          d085984d31845ee1481453980cb27330

          SHA1

          c807bf7fe564d8b0ce6c443fe5b03b74e849ed33

          SHA256

          80c2c7bba4315f170997d4f8fa4a977951dd3ca80ec0fcc7a8425d8eb429ce89

          SHA512

          31022f557c57aff90a86d3bc5f55ed71226b8d08f1bfb1b8d93b206f2e91883747653d813d5660b1dd1c99cd80af25d5e97e5242a680582e6021bffd5893895c

        • \??\c:\users\admin\appdata\local\temp\uplog.txt.zip

          Filesize

          9KB

          MD5

          3899bb128e5b294440bb8eecbcf5ac14

          SHA1

          a00b56c237e40ab7885bf694d98496de5623317c

          SHA256

          fae642716dfca375674fc5cae925f8156c0b65f1d146877525ebdff69fcdad02

          SHA512

          02f67ef5b9c8788dbaded76ed2b76680beed49cfb3c51ac2248ab4c1b266a66cba662e66fcfa8359c8a7e087f4f546215d7356ac32416d19acd05cdb281f7661

        • \Users\Admin\AppData\Local\Temp\Sec.exe

          Filesize

          108KB

          MD5

          dfa1023dace7cf6736ca42933f143761

          SHA1

          780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

          SHA256

          722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

          SHA512

          26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

        • \Users\Admin\AppData\Local\Temp\Sec.exe

          Filesize

          108KB

          MD5

          dfa1023dace7cf6736ca42933f143761

          SHA1

          780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

          SHA256

          722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

          SHA512

          26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

        • memory/272-322-0x0000000000400000-0x000000000044D000-memory.dmp

          Filesize

          308KB

        • memory/272-299-0x0000000000400000-0x000000000044D000-memory.dmp

          Filesize

          308KB

        • memory/272-311-0x0000000000400000-0x000000000044D000-memory.dmp

          Filesize

          308KB

        • memory/1976-313-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1976-298-0x00000000038A0000-0x00000000038ED000-memory.dmp

          Filesize

          308KB

        • memory/1976-303-0x00000000038A0000-0x00000000038ED000-memory.dmp

          Filesize

          308KB

        • memory/1976-87-0x0000000002640000-0x0000000002650000-memory.dmp

          Filesize

          64KB

        • memory/1976-55-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1976-72-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1976-58-0x0000000002640000-0x0000000002650000-memory.dmp

          Filesize

          64KB

        • memory/1976-54-0x0000000000400000-0x000000000044C000-memory.dmp

          Filesize

          304KB

        • memory/1976-314-0x0000000002640000-0x0000000002646000-memory.dmp

          Filesize

          24KB