Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 11:45

General

  • Target

    1773565cd9cfff6c1e570c1cd8996dca.exe

  • Size

    459KB

  • MD5

    1773565cd9cfff6c1e570c1cd8996dca

  • SHA1

    45f2df63ac7b82d2b2ae87a4ce03324b32c39f81

  • SHA256

    38dcaf30cc9d82ee6b919db70bc954dbee92bc9b370f5ead158339932ba9b027

  • SHA512

    f3ba89bd6ecac710606df46317281a87010414cb7360b55d409d38cf655a068109163f78c992d964f188d4f5346f9e649bc84a5239703dfe07ab48b368646fa0

  • SSDEEP

    6144:1G3FnRQ3CTZyokIeWIo2i1oUSvEGkJXc5ILB2+PWzFLKlXlBk1RPd/WhubkirBt2:016ucvECUBv+hZzcd7aEARLWF

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 26 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 14 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1773565cd9cfff6c1e570c1cd8996dca.exe
    "C:\Users\Admin\AppData\Local\Temp\1773565cd9cfff6c1e570c1cd8996dca.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\6f11.dll"
      2⤵
        PID:2732
      • C:\Users\Admin\AppData\Local\Temp\hzcg\miniup.exe
        C:\Users\Admin\AppData\Local\Temp\hzcg\miniup.exe
        2⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 "C:\Windows\Downlo~1\qmaey.dll",start
          3⤵
            PID:3964
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 "C:\Windows\Downlo~1\ki8.dll",Run
            3⤵
              PID:5288
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\6f11.dll"
            2⤵
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Modifies registry class
            PID:4416
          • C:\Windows\SysWOW64\f1971.exe
            C:\Windows\system32\f1971.exe -i
            2⤵
            • Executes dropped EXE
            PID:5368
          • C:\Windows\SysWOW64\f1971.exe
            C:\Windows\system32\f1971.exe -s
            2⤵
            • Executes dropped EXE
            PID:5188
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\system32\rundll32 C:\Windows\system32\f61.dll,Always
            2⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Drops file in System32 directory
            PID:3996
        • C:\Windows\SysWOW64\f1971.exe
          C:\Windows\SysWOW64\f1971.exe
          1⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Drops file in System32 directory
          PID:712

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\hzcg\bho.dll

          Filesize

          52KB

          MD5

          f8f15a3bf018061ed8175c38b7adcdbd

          SHA1

          1edcd70fbdc0fa214d9945fbb06ff8cb744227d0

          SHA256

          6fb6cbb52552c4ddfeb1ec388708439871e5ac17eda1dcf7b3b3dfc9db96c899

          SHA512

          21a57f06650e46af61ab76121f6834568e7e5968bd95813d81766456e79a9690885919644e750a193a921322d3ab31150c4d3253468a8a040a2e7eb3780f69fd

        • C:\Users\Admin\AppData\Local\Temp\hzcg\miniup.exe

          Filesize

          65KB

          MD5

          8ee98af38e6c1af39891764ca81b2371

          SHA1

          f396faa9927915989978af4e7c3f3168d0c0cec2

          SHA256

          1cdd44dee8cabab8cdfa104eba66e3370ad3f869aaa7bfac5d1f2d9f6f3858dd

          SHA512

          8b401ff22e27d60e3a2b107d823de7190be5b66a5f1737ff5d0b11fa60fc09df19c9d4014f5970e101a58db44146ea3694d6c85d56f1c6907eabb087e66f7277

        • C:\Users\Admin\AppData\Local\Temp\hzcg\play.dll

          Filesize

          828KB

          MD5

          4fdf61c32981034098c0dd89fee696a9

          SHA1

          d50c5e1fdb0ac93830f8375d82c6616c94eb2874

          SHA256

          95cfb8c6a2f5e93ab66070a67ef5ee4719aa69e8a40b2facaae37aee05f017f0

          SHA512

          e700535511c506252c6100847d5c9bffe1c033422590d1c33f4357354bf8349a4d4aac313c2d21f620d1ce0a021c69197b194e871964fa3124f95e5eff173823

        • C:\Users\Admin\AppData\Local\Temp\hzcg\ser.exe

          Filesize

          120KB

          MD5

          bf21bc4774bdbce5c7cef9a05fbd9b53

          SHA1

          3804950dce3b6db85dd15b4bf3f15db4f362f963

          SHA256

          c46ebb3ae103911ccc6e2713ae31961ba09ac5d1e28655f5dbc1450b85bee2ac

          SHA512

          8748661e20fa4527b62637fce20dfa4379a4382a3a5785906f34d08d8c83dbcc8ede82cedce39471d64ed7c180c77864dc472fac4ff87b10364c58e15e56d70e

        • C:\Users\Admin\AppData\Local\Temp\v7p\miniDll.dll

          Filesize

          48KB

          MD5

          b183eb58336f1bf3c1bf55abc4743aae

          SHA1

          b3a4011b551ffdaed8c19a0d14ecac25e074934c

          SHA256

          2f3ef2445f92f679f6f8d16ebd8643d3d1fadb2d2be0e3d80ad3f8f214eceecd

          SHA512

          cd05c7d451b30357f19b0f81326ce226ffbe44efd2b1bc998e4afa2a17f58ea8394d950f0bc37573bd5b0be0fdedebba7c2868e98b306e4afdada53c20da0104

        • C:\Users\Admin\AppData\Local\Temp\v7p\up.dll

          Filesize

          64KB

          MD5

          31dbfa092525549c886f12f54d02a09d

          SHA1

          04fefce326814978d53694c875c1b7257a708398

          SHA256

          c9b4babcbe32a7daee70d1b827af603b2b44da90a6380521777c3a9fa36af705

          SHA512

          bf34f53a9311d68e33d9afdf50ca0714769c6c3ffc474b082c1655aa09431ece639c72b6930b0fe85d83db57f418a7037871f16f3856b194bc84c2752fe964c2

        • memory/3880-0-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/3880-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

          Filesize

          8KB

        • memory/3880-118-0x0000000000400000-0x000000000047F000-memory.dmp

          Filesize

          508KB

        • memory/4728-45-0x00000000001C0000-0x00000000001C2000-memory.dmp

          Filesize

          8KB

        • memory/4728-43-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/4728-81-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB