Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:19

General

  • Target

    4c44c56b871c9fba88d77acab86ce647.exe

  • Size

    294KB

  • MD5

    4c44c56b871c9fba88d77acab86ce647

  • SHA1

    f3d166cd1d3230cd67b306a97f7d4dafe300c771

  • SHA256

    150fb07d25c5963ed127b5565365c7b3c4fd94383794d11af5058f47932b53bb

  • SHA512

    c9749626fb74797b2532d044c6078e6797874d47d2e19c1140499b4580489c3552bc5c7688c050694b8a229afa69ff361eb95e0724816f772493bf24fabdd3bb

  • SSDEEP

    6144:7iGtsLLAlqNC+C+1PTG/qm/PgCnmUSFMhl4ii+M/oI29XqKs:WGtsLUt+L1PTEn/iUSFM8P+rI2ds

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp69045907.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 112
      2⤵
      • Program crash
      PID:1280
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "18199338561775221038-246517608-1688683689-116789589810484447711104970589-1671849638"
    1⤵
      PID:2288
    • C:\Users\Admin\AppData\Roaming\Kedyt\womyve.exe
      "C:\Users\Admin\AppData\Roaming\Kedyt\womyve.exe"
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2644
    • C:\Users\Admin\AppData\Local\Temp\4c44c56b871c9fba88d77acab86ce647.exe
      "C:\Users\Admin\AppData\Local\Temp\4c44c56b871c9fba88d77acab86ce647.exe"
      1⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1672
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:1584
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1132
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:1100
          • C:\Windows\system32\Dwm.exe
            "C:\Windows\system32\Dwm.exe"
            1⤵
              PID:1068

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Kedyt\womyve.exe

              Filesize

              294KB

              MD5

              36901d2986af3b3e371681db42234929

              SHA1

              bf38512f25f92b90398447df857a408fd11fa209

              SHA256

              c81862cbb4bdf5251065b2816b57541292b7f634a47ffa0654f42de1eb01d7cd

              SHA512

              b8c55496b91ca8fb66705ba0601dc5fa4b46d4d6a752ec22ba4cbccfd024b334e355e65c37ee7627f2068d0d4c8572565b903647f708256783d4e0d13f269ca2

            • memory/1068-17-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1068-23-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1068-22-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1068-21-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1068-18-0x0000000001FD0000-0x0000000002014000-memory.dmp

              Filesize

              272KB

            • memory/1100-28-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1100-25-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1100-27-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1100-26-0x00000000024D0000-0x0000000002514000-memory.dmp

              Filesize

              272KB

            • memory/1132-31-0x0000000002160000-0x00000000021A4000-memory.dmp

              Filesize

              272KB

            • memory/1132-33-0x0000000002160000-0x00000000021A4000-memory.dmp

              Filesize

              272KB

            • memory/1132-35-0x0000000002160000-0x00000000021A4000-memory.dmp

              Filesize

              272KB

            • memory/1132-37-0x0000000002160000-0x00000000021A4000-memory.dmp

              Filesize

              272KB

            • memory/1280-283-0x00000000025F0000-0x0000000002634000-memory.dmp

              Filesize

              272KB

            • memory/1280-280-0x0000000002640000-0x0000000002641000-memory.dmp

              Filesize

              4KB

            • memory/1280-190-0x00000000771B0000-0x00000000771B1000-memory.dmp

              Filesize

              4KB

            • memory/1280-189-0x00000000025F0000-0x0000000002634000-memory.dmp

              Filesize

              272KB

            • memory/1584-44-0x0000000000490000-0x00000000004D4000-memory.dmp

              Filesize

              272KB

            • memory/1584-43-0x0000000000490000-0x00000000004D4000-memory.dmp

              Filesize

              272KB

            • memory/1584-41-0x0000000000490000-0x00000000004D4000-memory.dmp

              Filesize

              272KB

            • memory/1584-42-0x0000000000490000-0x00000000004D4000-memory.dmp

              Filesize

              272KB

            • memory/1672-69-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-168-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-50-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-49-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-48-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-47-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-46-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-53-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-55-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-57-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-59-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-61-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-63-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-65-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-67-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-1-0x0000000000390000-0x00000000003DD000-memory.dmp

              Filesize

              308KB

            • memory/1672-167-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1672-51-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-71-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-73-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-75-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-79-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-153-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-94-0x00000000004A0000-0x00000000004E4000-memory.dmp

              Filesize

              272KB

            • memory/1672-77-0x00000000003F0000-0x00000000003F1000-memory.dmp

              Filesize

              4KB

            • memory/1672-7-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1672-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1672-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1672-0-0x0000000000280000-0x00000000002C4000-memory.dmp

              Filesize

              272KB

            • memory/1672-96-0x00000000771B0000-0x00000000771B1000-memory.dmp

              Filesize

              4KB

            • memory/2644-16-0x0000000000280000-0x00000000002C4000-memory.dmp

              Filesize

              272KB

            • memory/2644-20-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2644-281-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2644-19-0x0000000000370000-0x00000000003BD000-memory.dmp

              Filesize

              308KB