Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 18:49

General

  • Target

    3d9b9d376018e32d658b205f1c4d8800.exe

  • Size

    159KB

  • MD5

    3d9b9d376018e32d658b205f1c4d8800

  • SHA1

    75231cf7a162b5585335993d89acb5ec6c11e4cd

  • SHA256

    6d4be4e15bb062f1e90c6a7272c697aa4adbaca324a2ad7d918308e0d07a0501

  • SHA512

    51775443e0ad5d8fcfc76af15d862240a62ce8dbf21f3f9ed5a0ab7e7992729c697e574a5fab7e7113607e288eeb0bc2b66afa7ba8731192361e77b21e438d33

  • SSDEEP

    3072:u3zyLTvBYetasoHpjXwNuxzyATJEhDHWewZcdQwMwfci:u3zeTlWhwY5yATWH9wZcd1Mwki

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
      "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2368
  • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Roaming\Pwzgzv.exe
      "C:\Users\Admin\AppData\Roaming\Pwzgzv.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Users\Admin\AppData\Roaming\Pwzgzv.exe
        "C:\Users\Admin\AppData\Roaming\Pwzgzv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2564
  • C:\Users\Admin\AppData\Roaming\Pwzgzv.exe
    "C:\Users\Admin\AppData\Roaming\Pwzgzv.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6e49a852269391e5495adda18ed80ba

    SHA1

    f0d1e3c4ee55435f88004dda9c332eeb7e0e865b

    SHA256

    1fcf02aa973451c1f461395efc6a148c7ab2afeaab7f6f6a5abdd088ef5adb13

    SHA512

    c409958e30b36d95c144ced69d6e8d69415f003232a85d853c9c9a0a20af3f496a0e92610aec079033868115cf6f467dcdf881d491e89d9478ffcc103ac9b5d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29eddb0a38a6440814b78e4f7bfc0586

    SHA1

    4dbd33ee3d0f81f82f793f28762c4591e688d7e8

    SHA256

    8f72a2f7c8f694f226246f9422b2ca0c56b20373d7ea1495cba1a39e169030d7

    SHA512

    fc3f5bc79593defc641bc420890adc29da6b1fc132262ce51693429f76b617e8253ff54fd58707214bc9ec5079fc66798d23398fa59b0b9b89b69c27b4171c33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5f85a9bc27b781a60ad21ca95ad9151d

    SHA1

    06a952aa45643905ecf57daa66bc5d6dd8da255c

    SHA256

    022efbabb1f4c39e4c677bbacdc0f62104bcf975977fc46a4225acf3f9a72c85

    SHA512

    5200fdffbc1f12e8c10b5916b0ebadaafdea668bf0dd074f1c4891bce695d41021d7a6453d1f2b89412788ffa026746ad68fdf31e58e983c01f07611da6750b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    901b17721feb1f2ca79e411536ad1572

    SHA1

    ff58210faf9dbf30449e7ed9633edbad7e02c963

    SHA256

    2d58b5143abd69d75de7ed624233d562db3a54f109a5e21c455373601737951f

    SHA512

    88e8d291103a85da006c25faba4d754251c815d992dae88bb825f10ca0cb43ab76308180507e3007d871824009ebe2daa9866c46997c23d1fd797072af573180

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    454a9e6241e719f98bd926b2080b4c28

    SHA1

    df1d48c2efaac425f52014d7c19bea2a5a669403

    SHA256

    1a4f7e9a0c6e181fcc08cf37efcb7a721d309392d9ede1c7c6c8a86f4949f3a6

    SHA512

    a9fda4e929f952dd48e4a48ac8c22371fd41ec9c97204768094ce40b3f6696dc695b4ecae27ac18d671b550985e9b70336a56e3bd79105e3838ef21ae0310f37

  • memory/2368-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-18-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2368-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2368-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2796-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-45-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-32-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-33-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2796-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-84-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3012-90-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB