Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 06:47

General

  • Target

    84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe

  • Size

    536KB

  • MD5

    74bcc42a4bb2f206d76f562d21bb2284

  • SHA1

    355dbb36f5088ba5ebd2fb2e84f2ff2f4cfa46eb

  • SHA256

    84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c

  • SHA512

    43a42aefe9f79e1f5a5983f0e9aea87b388a293322ad9701ffef99aa93759ac8d1a94a921dc6f0cee96b3fd3ef10d9cde4fd3569b04480fd7c6568401025e02e

  • SSDEEP

    12288:xhf0Bs9bDDq9huzJgIJzgXaEw9Stu/aB9a/Okx2LIa:xdQyDLzJTveuK0/Okx2LF

Score
10/10
upx

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
      • C:\Windows\Logs\unregmp2.exe
        "C:\Windows\Logs\unregmp2.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe
        "C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:3036

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Cab4607.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\Tar61E3.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Local\Temp\a1832ac7.tmp

            Filesize

            14.5MB

            MD5

            6697f78c0dffa2e0b851046aaf272101

            SHA1

            b91aeb9e6d4d99778a4fe27da2457cdb321e8bfe

            SHA256

            354b9545fbb292faea96eadbef7c85caf0f6f72b915e567044833fdfc2b923f0

            SHA512

            fd5d44c6aa0c791e77bfec1436e810b1ef6cd1c92937faa060b6688b5dd4a47268189639e628e2fed8ce57ad04b0e816f18b16d2a3e69e60cbd16049948766d4

          • C:\Windows\Logs\unregmp2.exe

            Filesize

            316KB

            MD5

            64b328d52dfc8cda123093e3f6e4c37c

            SHA1

            f68f45b21b911906f3aa982e64504e662a92e5ab

            SHA256

            7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

            SHA512

            e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

          • \Windows\Logs\unregmp2.exe

            Filesize

            316KB

            MD5

            64b328d52dfc8cda123093e3f6e4c37c

            SHA1

            f68f45b21b911906f3aa982e64504e662a92e5ab

            SHA256

            7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

            SHA512

            e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

          • memory/424-71-0x0000000000970000-0x0000000000998000-memory.dmp

            Filesize

            160KB

          • memory/424-70-0x0000000000970000-0x0000000000998000-memory.dmp

            Filesize

            160KB

          • memory/424-61-0x0000000000820000-0x0000000000841000-memory.dmp

            Filesize

            132KB

          • memory/1260-143-0x000007FEF5570000-0x000007FEF56B3000-memory.dmp

            Filesize

            1.3MB

          • memory/1260-35-0x0000000003DB0000-0x0000000003DB3000-memory.dmp

            Filesize

            12KB

          • memory/1260-32-0x0000000003DB0000-0x0000000003DB3000-memory.dmp

            Filesize

            12KB

          • memory/1260-39-0x0000000008910000-0x0000000008A09000-memory.dmp

            Filesize

            996KB

          • memory/1260-26-0x0000000003BE0000-0x0000000003BE1000-memory.dmp

            Filesize

            4KB

          • memory/1260-142-0x000007FEB0C60000-0x000007FEB0C6A000-memory.dmp

            Filesize

            40KB

          • memory/1260-24-0x00000000074B0000-0x00000000075A4000-memory.dmp

            Filesize

            976KB

          • memory/1260-54-0x0000000003CA0000-0x0000000003D19000-memory.dmp

            Filesize

            484KB

          • memory/1260-141-0x000007FEF5570000-0x000007FEF56B3000-memory.dmp

            Filesize

            1.3MB

          • memory/1260-4-0x0000000002B20000-0x0000000002B23000-memory.dmp

            Filesize

            12KB

          • memory/1260-7-0x0000000002B20000-0x0000000002B23000-memory.dmp

            Filesize

            12KB

          • memory/1260-6-0x0000000003CA0000-0x0000000003D19000-memory.dmp

            Filesize

            484KB

          • memory/1260-3-0x0000000002B20000-0x0000000002B23000-memory.dmp

            Filesize

            12KB

          • memory/1924-37-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

            Filesize

            1.0MB

          • memory/1924-72-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

            Filesize

            1.0MB

          • memory/1924-0-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

            Filesize

            1.0MB

          • memory/2740-129-0x00000000045B0000-0x0000000004775000-memory.dmp

            Filesize

            1.8MB

          • memory/2740-130-0x00000000045B0000-0x0000000004775000-memory.dmp

            Filesize

            1.8MB

          • memory/2740-123-0x0000000000970000-0x0000000000998000-memory.dmp

            Filesize

            160KB

          • memory/2740-124-0x00000000003C0000-0x000000000048B000-memory.dmp

            Filesize

            812KB

          • memory/2740-126-0x00000000020C0000-0x00000000020CA000-memory.dmp

            Filesize

            40KB

          • memory/2740-125-0x00000000020C0000-0x00000000020C1000-memory.dmp

            Filesize

            4KB

          • memory/2740-127-0x00000000020C0000-0x00000000020CA000-memory.dmp

            Filesize

            40KB

          • memory/2740-128-0x00000000020C0000-0x00000000020CA000-memory.dmp

            Filesize

            40KB

          • memory/2740-120-0x0000000036F30000-0x0000000036F40000-memory.dmp

            Filesize

            64KB

          • memory/2740-122-0x00000000003C0000-0x000000000048B000-memory.dmp

            Filesize

            812KB

          • memory/2740-131-0x00000000020C0000-0x00000000020C1000-memory.dmp

            Filesize

            4KB

          • memory/2740-132-0x00000000020D0000-0x00000000020D1000-memory.dmp

            Filesize

            4KB

          • memory/2740-133-0x00000000020D0000-0x00000000020D1000-memory.dmp

            Filesize

            4KB

          • memory/2740-134-0x00000000045B0000-0x0000000004775000-memory.dmp

            Filesize

            1.8MB

          • memory/2740-58-0x00000000003C0000-0x000000000048B000-memory.dmp

            Filesize

            812KB

          • memory/2740-55-0x00000000003C0000-0x000000000048B000-memory.dmp

            Filesize

            812KB

          • memory/2740-42-0x0000000000060000-0x0000000000123000-memory.dmp

            Filesize

            780KB

          • memory/2740-59-0x000007FEBEB40000-0x000007FEBEB50000-memory.dmp

            Filesize

            64KB