Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2023, 17:23

General

  • Target

    AUS 9141124-2023.exe

  • Size

    938KB

  • MD5

    1530c857fe5d228b4836a177a7fbb92f

  • SHA1

    05d8268b3f56c60b3d318902c37920f9ad030872

  • SHA256

    a48bdc85f4da302d6c3bd23a5edb8b56a64ffe9e0f79b6e150c11982295b277e

  • SHA512

    1b2ff549ef77316e8256a4cc242b85b539d00252d7f9bb6d2d27e2f999838fa68625b6dbd716488bada4a210a3c01c6d96bd3df56021b758c22beda086e9e2e0

  • SSDEEP

    24576:8mtD/61xQUqRbqfLZAY4cFAs+VXI4YU5nLsjvEN:Z6gVRbqfWsQMUVL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe
      "C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe
        "C:\Users\Admin\AppData\Local\Temp\AUS 9141124-2023.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2432
    • C:\Windows\SysWOW64\netiougc.exe
      "C:\Windows\SysWOW64\netiougc.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2836

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\w0yhzl.zip

            Filesize

            486KB

            MD5

            1e73cacce02ae20026a81f1e56416aa3

            SHA1

            f491a7301ce11cf11a92c0245c7e03d927422286

            SHA256

            0dd0dd38cde5a14e7d6d0830db62cc7037e521fd042b0b8da0763128b2c0b3f2

            SHA512

            afe77facd8b16cc744ac2277414ffaf83436999d15eb8ac707f8098e2f8ed4cb29b430392ebe46b7fa65b20730615bc33dee9416f7141da5032a630894980a0a

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            927KB

            MD5

            7fd80b1cc72dc580c02ca4cfbfb2592d

            SHA1

            18da905af878b27151b359cf1a7d0a650764e8a1

            SHA256

            1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

            SHA512

            13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

          • memory/1232-30-0x00000000096A0000-0x000000000A136000-memory.dmp

            Filesize

            10.6MB

          • memory/1232-18-0x0000000002700000-0x0000000002800000-memory.dmp

            Filesize

            1024KB

          • memory/1232-20-0x00000000096A0000-0x000000000A136000-memory.dmp

            Filesize

            10.6MB

          • memory/1232-28-0x0000000003E40000-0x0000000003F01000-memory.dmp

            Filesize

            772KB

          • memory/1232-29-0x0000000003E40000-0x0000000003F01000-memory.dmp

            Filesize

            772KB

          • memory/1232-74-0x0000000003E40000-0x0000000003F01000-memory.dmp

            Filesize

            772KB

          • memory/1748-6-0x0000000005B60000-0x0000000005BDE000-memory.dmp

            Filesize

            504KB

          • memory/1748-1-0x00000000741A0000-0x000000007488E000-memory.dmp

            Filesize

            6.9MB

          • memory/1748-0-0x0000000000FD0000-0x00000000010C0000-memory.dmp

            Filesize

            960KB

          • memory/1748-12-0x00000000741A0000-0x000000007488E000-memory.dmp

            Filesize

            6.9MB

          • memory/1748-2-0x0000000004E80000-0x0000000004EC0000-memory.dmp

            Filesize

            256KB

          • memory/1748-3-0x00000000004C0000-0x00000000004D8000-memory.dmp

            Filesize

            96KB

          • memory/1748-5-0x00000000004E0000-0x00000000004EA000-memory.dmp

            Filesize

            40KB

          • memory/1748-4-0x00000000004A0000-0x00000000004A6000-memory.dmp

            Filesize

            24KB

          • memory/2432-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2432-14-0x0000000000870000-0x0000000000B73000-memory.dmp

            Filesize

            3.0MB

          • memory/2432-19-0x0000000000210000-0x000000000022D000-memory.dmp

            Filesize

            116KB

          • memory/2432-16-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-7-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-17-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-23-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-24-0x0000000000210000-0x000000000022D000-memory.dmp

            Filesize

            116KB

          • memory/2432-8-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-11-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-13-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2432-15-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2936-22-0x0000000000130000-0x000000000016A000-memory.dmp

            Filesize

            232KB

          • memory/2936-27-0x00000000006C0000-0x000000000075C000-memory.dmp

            Filesize

            624KB

          • memory/2936-31-0x0000000000130000-0x000000000016A000-memory.dmp

            Filesize

            232KB

          • memory/2936-25-0x0000000000990000-0x0000000000C93000-memory.dmp

            Filesize

            3.0MB

          • memory/2936-26-0x0000000000130000-0x000000000016A000-memory.dmp

            Filesize

            232KB

          • memory/2936-72-0x0000000061E00000-0x0000000061ED2000-memory.dmp

            Filesize

            840KB

          • memory/2936-73-0x00000000006C0000-0x000000000075C000-memory.dmp

            Filesize

            624KB

          • memory/2936-21-0x0000000000130000-0x000000000016A000-memory.dmp

            Filesize

            232KB