Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 14:19

General

  • Target

    0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe

  • Size

    223KB

  • MD5

    c3884fdb01c5772eabc515a30513e556

  • SHA1

    213ad80a218ba9d98948710ff0b119dcbca70d0f

  • SHA256

    0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224

  • SHA512

    a4b9b4b8b4757e7aa45ab978a0daeaef6ae4f3fc98a242edda6a67312d564f268f8cba5506e3270ac5c3f6145243d44989f31c90a0358a006a3f96ca04481733

  • SSDEEP

    3072:qZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:mwPSUONLNsuWA7koN+boRi9S6oiz72D

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops file in Drivers directory 9 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe
      "C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe"
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\0b4d3cfa152d31b3e7676884d442516c9cbc87a07657f652bececa390431c224.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          4⤵
          • Delays execution with timeout.exe
          PID:2648
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1220
  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
      • C:\Windows\Logs\driverquery.exe
        "C:\Windows\Logs\driverquery.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\system32\ReAgentc.exe
          "C:\Windows\system32\ReAgentc.exe"
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab4404.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Cab513E.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Users\Admin\AppData\Local\Temp\Tar5150.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Users\Admin\AppData\Local\Temp\Tar83C5.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\3hNxEE851l2fk.sys

      Filesize

      415KB

      MD5

      64bc1983743c584a9ad09dacf12792e5

      SHA1

      0f14098f523d21f11129c4df09451413ddff6d61

      SHA256

      057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5

      SHA512

      9ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c

    • C:\Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • C:\Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      bf5911b141b7c3d4e5ac13f69b64b18b

      SHA1

      dccc131271b45b57f78dcb38f2545411bc342add

      SHA256

      a3f8560e778b848807215f441323569c600509fe4b5cd78af203066371ba23b1

      SHA512

      872ae7dc9ae590dbab72fb55824b556f235037d32853662b9c4e0cc09f6d1e2b8af8c1a31a915145c14cba49f9f3f8e6ddc72ae373b67199cef60917d3a1d4d8

    • C:\Windows\mXt0CPaJk0.sys

      Filesize

      447KB

      MD5

      d15f5f23df8036bd5089ce8d151b0e0d

      SHA1

      4066ff4d92ae189d92fcdfb8c11a82cc9db56bb2

      SHA256

      f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520

      SHA512

      feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9

    • C:\Windows\vDYtWg8z9esPh.sys

      Filesize

      447KB

      MD5

      e71d42ddf06808ff0cedf7fb168354a1

      SHA1

      6a8ecdcba3d24a21b87453dbbe002f08fde02591

      SHA256

      418c834495462b21faf850f48fc9bf92b50d55ec49fefe25ac398fe9fd30e85e

      SHA512

      1241aa4bc13764c6be6ae3769558db9df4f9b6d8639b338d114e32841dfc69f5f41f728525c0ff690e98ad7c871f3593806b48d5941c2ac3289570481c1264bc

    • C:\Windows\yoDRyNHePXx.sys

      Filesize

      415KB

      MD5

      20310c607a9b2f73c22415070ecd72a4

      SHA1

      ca94b931deb3919cfcc58c8ad3995a57b1f6610e

      SHA256

      f66af3bb7175710d3247afd6c3a3bc72df11f06393a17c8fa9feed81ea6c29f5

      SHA512

      da368950b1abe1754787915a75722bad9ed36b59160076cc8693508bde868e4137ef56fd37dd938978ddea99291c21a00e230d30e8ae8a9935a11513a2f649ce

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • \Windows\Logs\driverquery.exe

      Filesize

      94KB

      MD5

      e2bcd723ea3517e71a154502127b5d92

      SHA1

      4ef626bfc18e4707a195a79a975392b30d0d603e

      SHA256

      0e831713c435d85c6fab664e344742d72177c93f7a21e3187d959c5c58b071cc

      SHA512

      497c61496df168661b4fea56310c7641e8e76bab1914cf65a4d8153b3b2a34ecbea6e1e647bca9271c0e650931fa7b66e8cec126c41eb9f5c9f9125a11108d7a

    • memory/420-47-0x00000000007F0000-0x0000000000818000-memory.dmp

      Filesize

      160KB

    • memory/420-44-0x00000000007E0000-0x00000000007E3000-memory.dmp

      Filesize

      12KB

    • memory/860-46-0x0000000001100000-0x000000000116E000-memory.dmp

      Filesize

      440KB

    • memory/860-54-0x0000000001100000-0x000000000116E000-memory.dmp

      Filesize

      440KB

    • memory/860-0-0x0000000001100000-0x000000000116E000-memory.dmp

      Filesize

      440KB

    • memory/860-71-0x0000000001100000-0x000000000116E000-memory.dmp

      Filesize

      440KB

    • memory/1180-151-0x0000000002160000-0x0000000002306000-memory.dmp

      Filesize

      1.6MB

    • memory/1180-117-0x0000000000260000-0x00000000003FC000-memory.dmp

      Filesize

      1.6MB

    • memory/1180-148-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/1180-220-0x0000000002160000-0x0000000002306000-memory.dmp

      Filesize

      1.6MB

    • memory/1220-727-0x0000000002520000-0x0000000002642000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-757-0x0000000002520000-0x0000000002642000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-732-0x0000000001C00000-0x0000000001C01000-memory.dmp

      Filesize

      4KB

    • memory/1220-730-0x0000000001C00000-0x0000000001C01000-memory.dmp

      Filesize

      4KB

    • memory/1276-140-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/1276-56-0x0000000004D80000-0x0000000004E77000-memory.dmp

      Filesize

      988KB

    • memory/1276-17-0x0000000002BB0000-0x0000000002BB3000-memory.dmp

      Filesize

      12KB

    • memory/1276-756-0x00000000089C0000-0x0000000008AE2000-memory.dmp

      Filesize

      1.1MB

    • memory/1276-18-0x0000000002BB0000-0x0000000002BB3000-memory.dmp

      Filesize

      12KB

    • memory/1276-20-0x0000000004D80000-0x0000000004E77000-memory.dmp

      Filesize

      988KB

    • memory/1276-19-0x0000000002BB0000-0x0000000002BB3000-memory.dmp

      Filesize

      12KB

    • memory/1276-21-0x0000000004D80000-0x0000000004E77000-memory.dmp

      Filesize

      988KB

    • memory/1276-121-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/1276-731-0x0000000008AF0000-0x0000000008AF4000-memory.dmp

      Filesize

      16KB

    • memory/1276-729-0x0000000002CA0000-0x0000000002CA1000-memory.dmp

      Filesize

      4KB

    • memory/1276-728-0x0000000001BF0000-0x0000000001BF1000-memory.dmp

      Filesize

      4KB

    • memory/1276-725-0x00000000089C0000-0x0000000008AE2000-memory.dmp

      Filesize

      1.1MB

    • memory/1276-156-0x0000000002160000-0x0000000002306000-memory.dmp

      Filesize

      1.6MB

    • memory/1276-724-0x0000000002C70000-0x0000000002C73000-memory.dmp

      Filesize

      12KB

    • memory/1276-169-0x0000000002160000-0x0000000002306000-memory.dmp

      Filesize

      1.6MB

    • memory/1276-503-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/1276-206-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/1276-55-0x0000000004D80000-0x0000000004E77000-memory.dmp

      Filesize

      988KB

    • memory/1276-239-0x0000000002160000-0x0000000002306000-memory.dmp

      Filesize

      1.6MB

    • memory/3028-104-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-147-0x0000000002100000-0x0000000002101000-memory.dmp

      Filesize

      4KB

    • memory/3028-70-0x0000000000530000-0x00000000005FB000-memory.dmp

      Filesize

      812KB

    • memory/3028-102-0x00000000007F0000-0x0000000000818000-memory.dmp

      Filesize

      160KB

    • memory/3028-103-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-184-0x00000000059E0000-0x0000000005BAA000-memory.dmp

      Filesize

      1.8MB

    • memory/3028-42-0x0000000000530000-0x00000000005FB000-memory.dmp

      Filesize

      812KB

    • memory/3028-41-0x000007FEBEAE0000-0x000007FEBEAF0000-memory.dmp

      Filesize

      64KB

    • memory/3028-636-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/3028-697-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/3028-105-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-109-0x0000000002100000-0x000000000210F000-memory.dmp

      Filesize

      60KB

    • memory/3028-39-0x0000000000530000-0x00000000005FB000-memory.dmp

      Filesize

      812KB

    • memory/3028-106-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-40-0x0000000000530000-0x00000000005FB000-memory.dmp

      Filesize

      812KB

    • memory/3028-100-0x0000000037360000-0x0000000037370000-memory.dmp

      Filesize

      64KB

    • memory/3028-107-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-37-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/3028-33-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/3028-27-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/3028-25-0x0000000000140000-0x0000000000203000-memory.dmp

      Filesize

      780KB

    • memory/3028-108-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-750-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/3028-751-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/3028-119-0x00000000059E0000-0x0000000005BAA000-memory.dmp

      Filesize

      1.8MB

    • memory/3028-114-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/3028-115-0x0000000002120000-0x000000000214E000-memory.dmp

      Filesize

      184KB

    • memory/3028-755-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB

    • memory/3028-113-0x00000000040C0000-0x00000000041E2000-memory.dmp

      Filesize

      1.1MB

    • memory/3028-110-0x0000000003B50000-0x0000000003C07000-memory.dmp

      Filesize

      732KB

    • memory/3028-758-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

      Filesize

      4KB