Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 01:38

General

  • Target

    7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe

  • Size

    156KB

  • MD5

    7b4514e0db419bfea9a2ea64f974ede0

  • SHA1

    439774ded418431619b4d42ce0c090739b685eaa

  • SHA256

    b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

  • SHA512

    3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

  • SSDEEP

    3072:ovMweMP+MQ+U1gqZNGeyfiwSh4xylYN8IsfbkD1DR3gq27bkDK:w+x1xZsLaph/D7o

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\7b4514e0db419bfea9a2ea64f974ede0exe_JC.exe"78
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Drops startup file
      • Loads dropped DLL
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\ehouew\weuohe.exe
        "C:\Users\Admin\ehouew\weuohe.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Users\Admin\ehouew\weuohe.exe
          "C:\Users\Admin\ehouew\weuohe.exe" 78
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Drops autorun.inf file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c route add 216.239.32.21 0.0.0.0
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\SysWOW64\ROUTE.EXE
              route add 216.239.32.21 0.0.0.0
              6⤵
                PID:2044
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c route add 216.239.32.21 10.127.0.254
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2904
              • C:\Windows\SysWOW64\ROUTE.EXE
                route add 216.239.32.21 10.127.0.254
                6⤵
                  PID:2716
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c route add 216.239.34.21 0.0.0.0
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2760
                • C:\Windows\SysWOW64\ROUTE.EXE
                  route add 216.239.34.21 0.0.0.0
                  6⤵
                    PID:2928
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c route add 216.239.34.21 10.127.0.254
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3008
                  • C:\Windows\SysWOW64\ROUTE.EXE
                    route add 216.239.34.21 10.127.0.254
                    6⤵
                      PID:588
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c route add 216.239.36.21 0.0.0.0
                    5⤵
                      PID:3024
                      • C:\Windows\SysWOW64\ROUTE.EXE
                        route add 216.239.36.21 0.0.0.0
                        6⤵
                          PID:776
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c route add 216.239.36.21 10.127.0.254
                        5⤵
                          PID:1152
                          • C:\Windows\SysWOW64\ROUTE.EXE
                            route add 216.239.36.21 10.127.0.254
                            6⤵
                              PID:628
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c route add 216.239.38.21 0.0.0.0
                            5⤵
                              PID:1380
                              • C:\Windows\SysWOW64\ROUTE.EXE
                                route add 216.239.38.21 0.0.0.0
                                6⤵
                                  PID:856
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c route add 216.239.38.21 10.127.0.254
                                5⤵
                                  PID:1028
                                  • C:\Windows\SysWOW64\ROUTE.EXE
                                    route add 216.239.38.21 10.127.0.254
                                    6⤵
                                      PID:2240
                              • C:\Windows\SysWOW64\PhotoScreensaver.scr
                                "C:\Windows\System32\PhotoScreensaver.scr" /S
                                3⤵
                                  PID:2364

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\weuohe.lnk

                              Filesize

                              831B

                              MD5

                              d5479e1e73f926d4c5c70ae4a03fd556

                              SHA1

                              fd326952cacc0217e95464349a88c12a21b811ab

                              SHA256

                              e8dd388bc71bc7d88e8b2c6e1189716f954bf76b5446e2e4ac439d5b73042f53

                              SHA512

                              4c9c27bcb8012d4406e4ddf7c1fb0695ccd2f70dc224add28a81aa860d241de95fccbe5ff33186a1d430f8f934764b03e548a9c36bf4772de6e289a633349df6

                            • C:\Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • C:\Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • C:\Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • C:\Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • \Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • \Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • \Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • \Users\Admin\ehouew\weuohe.exe

                              Filesize

                              156KB

                              MD5

                              7b4514e0db419bfea9a2ea64f974ede0

                              SHA1

                              439774ded418431619b4d42ce0c090739b685eaa

                              SHA256

                              b730802a68a019b9e3b85a91e08fee0b192cf5298160c548ae06c4ef615467cb

                              SHA512

                              3f351c2f4e7faef7b6daaf5ad5ef07eb5f3bd181001cfc60842eebfda15e3c5727d38ef09e843eba1011d391f47aa1be5167a67d334e2d8cc4591691df866687

                            • memory/2036-39-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-68-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-2-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-9-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-4-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-23-0x0000000002EC0000-0x000000000397A000-memory.dmp

                              Filesize

                              10.7MB

                            • memory/2036-24-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-76-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-74-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-70-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-56-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2036-60-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2184-59-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2184-50-0x0000000004560000-0x000000000501A000-memory.dmp

                              Filesize

                              10.7MB

                            • memory/2184-49-0x0000000003540000-0x0000000003FFA000-memory.dmp

                              Filesize

                              10.7MB

                            • memory/2184-44-0x0000000000400000-0x0000000000418000-memory.dmp

                              Filesize

                              96KB

                            • memory/2364-28-0x00000000002C0000-0x00000000002C1000-memory.dmp

                              Filesize

                              4KB