Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2023, 11:13

General

  • Target

    52bf9715d3acb4a6651d0613f4584f600d180bc1b2038e36180345fbfc799cff.exe

  • Size

    2.8MB

  • MD5

    bc9adc65bb7198c92ac39a8221afcab3

  • SHA1

    6f6b24e7307f992bc1a6b8848fe934a383f16ae3

  • SHA256

    52bf9715d3acb4a6651d0613f4584f600d180bc1b2038e36180345fbfc799cff

  • SHA512

    9c3247bef1f1ffcad0419ff9fb911867803d344263027d823eaa75ec29bc08c7d41a9e1e96874234a87c666b6ecec90dea5090ce09b6f94666745c5ca89b9773

  • SSDEEP

    49152:HQ6nw5QZuTtS0rQMYOQ+q8CEMQ6nZQ6nK9KFeMdA:w6wWsM0r1QnW6m6K0Feb

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52bf9715d3acb4a6651d0613f4584f600d180bc1b2038e36180345fbfc799cff.exe
    "C:\Users\Admin\AppData\Local\Temp\52bf9715d3acb4a6651d0613f4584f600d180bc1b2038e36180345fbfc799cff.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\52bf9715d3acb4a6651d0613f4584f600d180bc1b2038e36180345fbfc799cff.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 1
        3⤵
        • Delays execution with timeout.exe
        PID:984
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\Help\unlodctr.exe
      "C:\Windows\Help\unlodctr.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2644
  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ccb7043cbec58b5f47694ca7885ef6b8

      SHA1

      22554aebfb0ed43755bb06d84143adee59cf7a57

      SHA256

      b6c69b966350c27f616bdf22f4a2de49235cf131af3ddc2610d6bd3575e70bb9

      SHA512

      333de1d7f25f88b316131405090db0200f40c297cd67e7b59399bab64ad60f668a249cdad50de8bb0b8869ea2d0342e800439d24cfe57bd66116f11a6d43c53f

    • C:\Users\Admin\AppData\Local\Temp\Cab5F03.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarAFF3.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\Help\unlodctr.exe

      Filesize

      39KB

      MD5

      b4bddfb5aca417fbcfdf5a037f3d16f0

      SHA1

      c9ec50947c87ebcb9242162c1017959aea191a30

      SHA256

      bf280bbe2d7dadb3dcb5c425310fa36239c9aa26f63ae4d37e0df3c78873ef26

      SHA512

      ed1dcd42a3892361a4445a63baa16d3c61792ee845cdf23db38f0efaf177b111b10f1b04765dc2bf5adf86ed058edcdf3ada37a45e53c27d0b4cdf0ef53b515e

    • \Windows\Help\unlodctr.exe

      Filesize

      39KB

      MD5

      b4bddfb5aca417fbcfdf5a037f3d16f0

      SHA1

      c9ec50947c87ebcb9242162c1017959aea191a30

      SHA256

      bf280bbe2d7dadb3dcb5c425310fa36239c9aa26f63ae4d37e0df3c78873ef26

      SHA512

      ed1dcd42a3892361a4445a63baa16d3c61792ee845cdf23db38f0efaf177b111b10f1b04765dc2bf5adf86ed058edcdf3ada37a45e53c27d0b4cdf0ef53b515e

    • memory/420-45-0x0000000000250000-0x0000000000278000-memory.dmp

      Filesize

      160KB

    • memory/420-43-0x0000000000240000-0x0000000000243000-memory.dmp

      Filesize

      12KB

    • memory/420-58-0x0000000000250000-0x0000000000278000-memory.dmp

      Filesize

      160KB

    • memory/1164-1-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1164-92-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1164-0-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1164-46-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1164-2-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1164-3-0x0000000000F00000-0x0000000000F6C000-memory.dmp

      Filesize

      432KB

    • memory/1204-139-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-142-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-156-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-157-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-158-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-159-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-160-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-155-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-154-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-48-0x0000000005060000-0x0000000005157000-memory.dmp

      Filesize

      988KB

    • memory/1204-153-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-24-0x0000000005060000-0x0000000005157000-memory.dmp

      Filesize

      988KB

    • memory/1204-21-0x0000000002BC0000-0x0000000002BC3000-memory.dmp

      Filesize

      12KB

    • memory/1204-22-0x0000000002BC0000-0x0000000002BC3000-memory.dmp

      Filesize

      12KB

    • memory/1204-91-0x000007FF69720000-0x000007FF6972A000-memory.dmp

      Filesize

      40KB

    • memory/1204-90-0x000007FEF6280000-0x000007FEF63C3000-memory.dmp

      Filesize

      1.3MB

    • memory/1204-23-0x0000000005060000-0x0000000005157000-memory.dmp

      Filesize

      988KB

    • memory/1204-152-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-151-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-150-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-149-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-148-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-147-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-146-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-145-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-144-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-143-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-141-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-140-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-20-0x0000000002BC0000-0x0000000002BC3000-memory.dmp

      Filesize

      12KB

    • memory/1204-138-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-137-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-136-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-135-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-120-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-122-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-131-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-130-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-129-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-128-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-127-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-126-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-125-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-124-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-123-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-132-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-133-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/1204-134-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/2644-106-0x0000000002060000-0x000000000206A000-memory.dmp

      Filesize

      40KB

    • memory/2644-40-0x000007FEBE460000-0x000007FEBE470000-memory.dmp

      Filesize

      64KB

    • memory/2644-117-0x0000000003940000-0x00000000039E0000-memory.dmp

      Filesize

      640KB

    • memory/2644-116-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2644-121-0x0000000002110000-0x0000000002120000-memory.dmp

      Filesize

      64KB

    • memory/2644-114-0x0000000003940000-0x00000000039E0000-memory.dmp

      Filesize

      640KB

    • memory/2644-113-0x0000000003940000-0x00000000039E0000-memory.dmp

      Filesize

      640KB

    • memory/2644-36-0x0000000000160000-0x0000000000163000-memory.dmp

      Filesize

      12KB

    • memory/2644-111-0x0000000002060000-0x000000000206A000-memory.dmp

      Filesize

      40KB

    • memory/2644-112-0x0000000002070000-0x0000000002071000-memory.dmp

      Filesize

      4KB

    • memory/2644-110-0x0000000002070000-0x000000000207F000-memory.dmp

      Filesize

      60KB

    • memory/2644-109-0x000007FF69720000-0x000007FF6972A000-memory.dmp

      Filesize

      40KB

    • memory/2644-118-0x0000000002060000-0x0000000002065000-memory.dmp

      Filesize

      20KB

    • memory/2644-108-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2644-115-0x0000000003940000-0x00000000039E0000-memory.dmp

      Filesize

      640KB

    • memory/2644-105-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2644-104-0x000007FF69720000-0x000007FF6972A000-memory.dmp

      Filesize

      40KB

    • memory/2644-102-0x0000000037C80000-0x0000000037C90000-memory.dmp

      Filesize

      64KB

    • memory/2644-49-0x0000000000500000-0x00000000005CB000-memory.dmp

      Filesize

      812KB

    • memory/2644-28-0x0000000000060000-0x0000000000123000-memory.dmp

      Filesize

      780KB

    • memory/2644-30-0x0000000000130000-0x0000000000131000-memory.dmp

      Filesize

      4KB

    • memory/2644-33-0x0000000000160000-0x0000000000163000-memory.dmp

      Filesize

      12KB

    • memory/2644-37-0x0000000000500000-0x00000000005CB000-memory.dmp

      Filesize

      812KB

    • memory/2644-107-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2644-41-0x0000000000500000-0x00000000005CB000-memory.dmp

      Filesize

      812KB

    • memory/2644-38-0x0000000000500000-0x00000000005CB000-memory.dmp

      Filesize

      812KB

    • memory/2644-181-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2644-180-0x0000000003940000-0x00000000039E0000-memory.dmp

      Filesize

      640KB