Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:06

General

  • Target

    15581a1a7ea5556e2bf99d900da6f956.exe

  • Size

    93KB

  • MD5

    15581a1a7ea5556e2bf99d900da6f956

  • SHA1

    eb6fa66083c4091bf07450b74cd836857edc5c42

  • SHA256

    26900865ce49ed9f34a58f05cda73d430b1b9ffcebeb62f890babb34aec9282b

  • SHA512

    37cc097f3761fa5b429b722da96d77cd439f1222e4289e7774908703734a16cc4687fbcd65c2d5c0bcdd2ea16728b14cdda0b0107f4b414f132a3718fab48538

  • SSDEEP

    1536:vwH8Alr3QF/GTqg8HLhobQLAfm5b8HLljs2mwEhstzWrY8p:6rlr39Og8HlKQLAfMmLljJmwEixWrhp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9518e9c9.bat"
    1⤵
    • Deletes itself
    PID:2528
  • C:\Users\Admin\AppData\Roaming\Aqugir\espo.exe
    "C:\Users\Admin\AppData\Roaming\Aqugir\espo.exe"
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2200
  • C:\Users\Admin\AppData\Local\Temp\15581a1a7ea5556e2bf99d900da6f956.exe
    "C:\Users\Admin\AppData\Local\Temp\15581a1a7ea5556e2bf99d900da6f956.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    1⤵
      PID:1604
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1384
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1320
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1208
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:2884
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1532

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmp9518e9c9.bat

                      Filesize

                      243B

                      MD5

                      211ff5f6b2278ebfe3443b091696450d

                      SHA1

                      ec856268d513e76021561a482b332fe57f6759f1

                      SHA256

                      a96681cb807bd6d7495dcb053ad7485de1ea4464ba909910c3c0b222c88dc688

                      SHA512

                      dd365d0826b4afc5c14cae7bcb1b08b9fd0da3a650618bce0296393dc0dcd221da9c15041f16358b0425e5e68d3831fa62de385431bbeffaa67e14ab126d264d

                    • C:\Users\Admin\AppData\Roaming\Aqugir\espo.exe

                      Filesize

                      93KB

                      MD5

                      a584d74e2d6362b9777cd992f4a52f22

                      SHA1

                      9182db61060f344ede45b0dfce3a85f4176aa3f1

                      SHA256

                      5817cc168e9c476a499686c39815dac65f80f834334fe3ac0ff89f22a2c47ebc

                      SHA512

                      3e1e5fe23f329400953c366d660a639baabac099eaefea05c683d4ae0e62b2b5d6c89005f2c299d338474dad04a24fb1e21f5a3e109eaeac2006a42729ecb3d0

                    • C:\Users\Admin\AppData\Roaming\Elgik\diyxa.ybe

                      Filesize

                      366B

                      MD5

                      3235125a8c86c603db709fbacf7be713

                      SHA1

                      ad1bcf5b76d59774ca304049a50010e4dc4f03b7

                      SHA256

                      e98c4dc0a73fec281e0fe95de4226d6dd30ced6e925972a56f9d8395d8f22869

                      SHA512

                      559bf6f1e2189c6a043ec0fb44e9c42b4bf6c9d5a22780d637280b91432189c442e7e0793fb93a87e5ff20ed2603b62af49b88bda7f5a7f35c9594122f6d6110

                    • memory/1208-10-0x0000000001D20000-0x0000000001D3A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1208-11-0x0000000001D20000-0x0000000001D3A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1208-12-0x0000000001D20000-0x0000000001D3A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1208-13-0x0000000001D20000-0x0000000001D3A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1208-14-0x0000000001D20000-0x0000000001D3A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1320-18-0x00000000002B0000-0x00000000002CA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1320-17-0x00000000002B0000-0x00000000002CA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1320-19-0x00000000002B0000-0x00000000002CA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1320-20-0x00000000002B0000-0x00000000002CA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1384-22-0x00000000025D0000-0x00000000025EA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1384-23-0x00000000025D0000-0x00000000025EA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1384-24-0x00000000025D0000-0x00000000025EA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1384-25-0x00000000025D0000-0x00000000025EA000-memory.dmp

                      Filesize

                      104KB

                    • memory/1604-30-0x0000000000160000-0x000000000017A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1604-27-0x0000000000160000-0x000000000017A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1604-28-0x0000000000160000-0x000000000017A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1604-29-0x0000000000160000-0x000000000017A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-65-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-53-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-48-0x00000000773A0000-0x00000000773A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-46-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-44-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-42-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-40-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-38-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-37-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-36-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-35-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-34-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-33-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-32-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-51-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-49-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-55-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-57-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-59-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-61-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-63-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-71-0x0000000000270000-0x000000000028A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1860-67-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1860-69-0x00000000002D0000-0x00000000002D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2528-114-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-75-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-77-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-78-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-79-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-80-0x0000000000050000-0x000000000006A000-memory.dmp

                      Filesize

                      104KB

                    • memory/2528-84-0x00000000773A0000-0x00000000773A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2528-113-0x00000000001D0000-0x00000000001D1000-memory.dmp

                      Filesize

                      4KB