Analysis

  • max time kernel
    298s
  • max time network
    296s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 22:25

General

  • Target

    b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2.exe

  • Size

    202KB

  • MD5

    0d4319ab251ef7326d331fde039c5440

  • SHA1

    982d2c249bcccdfda4faa1a4c6b5a974d0948156

  • SHA256

    b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

  • SHA512

    42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

  • SSDEEP

    3072:vbcmK0rkRsxd/jPvlpc3KTmfhQYH9Rh+/Gfclo5c5d:vImiyd/rU3KTmZF9j+/G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 5 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\system32\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2632
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\system32\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2516
    • C:\Users\Admin\AppData\Local\Temp\b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2.exe
      C:\Users\Admin\AppData\Local\Temp\b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2524
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5A4C52FE-C39D-4135-8FF4-1210C80D9460} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1260
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7BBF923A-3876-41C1-AED8-B84A741394B0} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
      C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Windows\system32\ipconfig.exe
          ipconfig /release
          4⤵
          • Gathers network information
          PID:964
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\system32\ipconfig.exe
          ipconfig /renew
          4⤵
          • Gathers network information
          PID:1744
      • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
        C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          4⤵
            PID:860
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
            4⤵
              PID:1104
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              4⤵
                PID:276
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                4⤵
                  PID:2372
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                  4⤵
                    PID:3056
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                    4⤵
                      PID:832
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                      4⤵
                        PID:3020
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                        4⤵
                          PID:2336
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                          4⤵
                            PID:3016
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                            4⤵
                              PID:2656
                        • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
                          C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2616
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c ipconfig /release
                            3⤵
                              PID:2992
                              • C:\Windows\system32\ipconfig.exe
                                ipconfig /release
                                4⤵
                                • Gathers network information
                                PID:2516

                        Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                0a145c4f42accc2966e3a24a7d77eac5

                                SHA1

                                9f4eb24a3f1211e6c2fedb327784bba225011aa1

                                SHA256

                                4a5adc235335bf1c8f6630181ce803632d7de12d43e62a268dffe5c2a6cf93f6

                                SHA512

                                10c2be157030fd86d2dfb07ad1e0f47752cf9474193d5e17e8cdbd16ad640f07d757393bfb20de483e914971215e5b837fc4742a00b2899cdf9f90019f67b9f3

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                b7d3ce0b883011eb7852e39581a6a4b4

                                SHA1

                                74d1404e293cc11f711563f06113f41637253e77

                                SHA256

                                c7384b09046a9268acb97b826059bc9a9e3a54f15df287a7656cdfc8ed03821e

                                SHA512

                                9eee6993da278b4da634cff2097e6bd0db46928018d4ced75dffccd4984bbda7b4ffa5cb82bcd1461f786452c31b9cc74898a73a83327be36517c9c20fc345d1

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                9bf778d2f4773fb9c63096e890984f9e

                                SHA1

                                3c14a8e8df6ddf14bbdd4cadd4132ad68c6761a2

                                SHA256

                                64fa4bf82e0b5b1613761667f0848ba6c1f32e2f7ebc816784f0f37484bbb6cd

                                SHA512

                                4e98dbf7a2dde924f9cea648bf18c6c1706a7c12763edce6b39a85b70b5ee4aca61ccb445012865c3591106679961689b1a3c4440f477d8e631e0d9a87ff0dbe

                              • C:\Users\Admin\AppData\Local\Temp\Cab3FC0.tmp

                                Filesize

                                61KB

                                MD5

                                f3441b8572aae8801c04f3060b550443

                                SHA1

                                4ef0a35436125d6821831ef36c28ffaf196cda15

                                SHA256

                                6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                                SHA512

                                5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                              • C:\Users\Admin\AppData\Local\Temp\Tar4021.tmp

                                Filesize

                                163KB

                                MD5

                                9441737383d21192400eca82fda910ec

                                SHA1

                                725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                                SHA256

                                bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                                SHA512

                                7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                              • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe

                                Filesize

                                202KB

                                MD5

                                0d4319ab251ef7326d331fde039c5440

                                SHA1

                                982d2c249bcccdfda4faa1a4c6b5a974d0948156

                                SHA256

                                b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

                                SHA512

                                42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

                              • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe

                                Filesize

                                202KB

                                MD5

                                0d4319ab251ef7326d331fde039c5440

                                SHA1

                                982d2c249bcccdfda4faa1a4c6b5a974d0948156

                                SHA256

                                b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

                                SHA512

                                42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

                              • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe

                                Filesize

                                202KB

                                MD5

                                0d4319ab251ef7326d331fde039c5440

                                SHA1

                                982d2c249bcccdfda4faa1a4c6b5a974d0948156

                                SHA256

                                b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

                                SHA512

                                42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

                              • C:\Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe

                                Filesize

                                202KB

                                MD5

                                0d4319ab251ef7326d331fde039c5440

                                SHA1

                                982d2c249bcccdfda4faa1a4c6b5a974d0948156

                                SHA256

                                b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

                                SHA512

                                42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

                              • \Users\Admin\AppData\Roaming\MergeLogic\IsInvalid.exe

                                Filesize

                                202KB

                                MD5

                                0d4319ab251ef7326d331fde039c5440

                                SHA1

                                982d2c249bcccdfda4faa1a4c6b5a974d0948156

                                SHA256

                                b9e034f81cca628a7bc2dd4dc341a2014437fa79a6f6834e0774e773dfb09bc2

                                SHA512

                                42c65d195fe3656b8f2a45117cc97b36674d18fad5d94b688d88f44d5fbc3f3ce724116080e9841491a853aa38655eb7145756daac9daec8734bd6f5b6ad8ae5

                              • memory/820-130-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/820-129-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-128-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-127-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-125-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-124-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/820-139-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-118-0x000007FFFFFDB000-0x000007FFFFFDC000-memory.dmp

                                Filesize

                                4KB

                              • memory/820-149-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-150-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/820-151-0x0000000000E20000-0x0000000000EA0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1260-77-0x0000000001140000-0x00000000011C0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1260-69-0x0000000000E00000-0x0000000000E08000-memory.dmp

                                Filesize

                                32KB

                              • memory/1260-70-0x000007FEEE350000-0x000007FEEECED000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/1260-71-0x0000000001140000-0x00000000011C0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1260-72-0x0000000001140000-0x00000000011C0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1260-73-0x0000000001140000-0x00000000011C0000-memory.dmp

                                Filesize

                                512KB

                              • memory/1260-68-0x0000000019CB0000-0x0000000019F92000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/1260-78-0x000007FEEE350000-0x000007FEEECED000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/1260-76-0x000007FEEE350000-0x000007FEEECED000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/1616-114-0x000000001B7F0000-0x000000001B870000-memory.dmp

                                Filesize

                                512KB

                              • memory/1616-86-0x0000000001230000-0x0000000001268000-memory.dmp

                                Filesize

                                224KB

                              • memory/1616-113-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1616-126-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1616-87-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/1616-88-0x000000001B7F0000-0x000000001B870000-memory.dmp

                                Filesize

                                512KB

                              • memory/2524-60-0x000000001BB00000-0x000000001BC00000-memory.dmp

                                Filesize

                                1024KB

                              • memory/2524-51-0x0000000140000000-0x00000001400A2000-memory.dmp

                                Filesize

                                648KB

                              • memory/2524-63-0x0000000001040000-0x0000000001094000-memory.dmp

                                Filesize

                                336KB

                              • memory/2524-61-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/2524-81-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/2524-50-0x0000000140000000-0x00000001400A2000-memory.dmp

                                Filesize

                                648KB

                              • memory/2524-75-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/2524-58-0x0000000000820000-0x00000000008A0000-memory.dmp

                                Filesize

                                512KB

                              • memory/2524-62-0x0000000000E10000-0x0000000000E66000-memory.dmp

                                Filesize

                                344KB

                              • memory/2524-55-0x0000000140000000-0x00000001400A2000-memory.dmp

                                Filesize

                                648KB

                              • memory/2524-74-0x0000000000820000-0x00000000008A0000-memory.dmp

                                Filesize

                                512KB

                              • memory/2524-53-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

                                Filesize

                                4KB

                              • memory/2524-52-0x0000000140000000-0x00000001400A2000-memory.dmp

                                Filesize

                                648KB

                              • memory/2616-153-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/2616-173-0x0000000000980000-0x0000000000A00000-memory.dmp

                                Filesize

                                512KB

                              • memory/2616-172-0x000007FEF4910000-0x000007FEF52FC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/2616-154-0x0000000000980000-0x0000000000A00000-memory.dmp

                                Filesize

                                512KB

                              • memory/3036-47-0x000000001C650000-0x000000001C716000-memory.dmp

                                Filesize

                                792KB

                              • memory/3036-4-0x000000001BD00000-0x000000001BD80000-memory.dmp

                                Filesize

                                512KB

                              • memory/3036-3-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/3036-2-0x000000001BD00000-0x000000001BD80000-memory.dmp

                                Filesize

                                512KB

                              • memory/3036-46-0x000000001BBF0000-0x000000001BCC8000-memory.dmp

                                Filesize

                                864KB

                              • memory/3036-59-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB

                              • memory/3036-1-0x0000000001130000-0x0000000001168000-memory.dmp

                                Filesize

                                224KB

                              • memory/3036-48-0x0000000001090000-0x00000000010DC000-memory.dmp

                                Filesize

                                304KB

                              • memory/3036-0-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

                                Filesize

                                9.9MB