Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2024 01:35

General

  • Target

    447d740124697f9b1327ab2758ee4f88.exe

  • Size

    363KB

  • MD5

    447d740124697f9b1327ab2758ee4f88

  • SHA1

    191552c579bb002805516e7ac74a710fcf6a460c

  • SHA256

    554e0aa62697e41dfaa2f0ddeadaa4ea7b29a1558041870fbc5c381a03a7613b

  • SHA512

    5ac29e9d40774a78bcbc33924cdb24d24fe3389026a588c6fb18a1c6227015250270f302f332bfd6651fee78ceb526af19cc0393011688a53066641c84b5661b

  • SSDEEP

    6144:8bIAyTXoQ3bBVJxRbq3gkKJFoXrIePZ3hH0WO13kKHy:XT4el77eoJFe0eh6Hy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\447d740124697f9b1327ab2758ee4f88.exe
        "C:\Users\Admin\AppData\Local\Temp\447d740124697f9b1327ab2758ee4f88.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc97c16a8.bat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:896
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 116
            4⤵
            • Program crash
            • Suspicious use of WriteProcessMemory
            PID:1248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 536
              5⤵
              • Program crash
              PID:1568
        • C:\Users\Admin\AppData\Roaming\Iwsii\ahli.exe
          "C:\Users\Admin\AppData\Roaming\Iwsii\ahli.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2488
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:320
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1192
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1128
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-195951677814503984671017121529-756744923-203108215613258263489698066741725740800"
            1⤵
              PID:1956

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Iwsii\ahli.exe

              Filesize

              363KB

              MD5

              f3ffbd69f0f21927f9656fd41de64ff7

              SHA1

              8a9d011ae5c4cfa41b6e2eede3f2fbacdcb7c9a6

              SHA256

              c7aead0c9f0185ee2e083178f50e63dd4530009c5365f1bf9ee8b1faa5bcfd57

              SHA512

              ddc6d569fbf14f94759ec4a32af6d5a07300a77c3c524bea448f7de7a94f3de4cb10b28620e38dc6913fe60ac895abab670a7d4e1610c7690385cd81951fe60d

            • memory/320-35-0x0000000001B90000-0x0000000001BD4000-memory.dmp

              Filesize

              272KB

            • memory/320-37-0x0000000001B90000-0x0000000001BD4000-memory.dmp

              Filesize

              272KB

            • memory/320-36-0x0000000001B90000-0x0000000001BD4000-memory.dmp

              Filesize

              272KB

            • memory/320-38-0x0000000001B90000-0x0000000001BD4000-memory.dmp

              Filesize

              272KB

            • memory/1128-16-0x0000000001ED0000-0x0000000001F14000-memory.dmp

              Filesize

              272KB

            • memory/1128-22-0x0000000001ED0000-0x0000000001F14000-memory.dmp

              Filesize

              272KB

            • memory/1128-21-0x0000000001ED0000-0x0000000001F14000-memory.dmp

              Filesize

              272KB

            • memory/1128-20-0x0000000001ED0000-0x0000000001F14000-memory.dmp

              Filesize

              272KB

            • memory/1128-18-0x0000000001ED0000-0x0000000001F14000-memory.dmp

              Filesize

              272KB

            • memory/1192-28-0x00000000001A0000-0x00000000001E4000-memory.dmp

              Filesize

              272KB

            • memory/1192-25-0x00000000001A0000-0x00000000001E4000-memory.dmp

              Filesize

              272KB

            • memory/1192-26-0x00000000001A0000-0x00000000001E4000-memory.dmp

              Filesize

              272KB

            • memory/1192-27-0x00000000001A0000-0x00000000001E4000-memory.dmp

              Filesize

              272KB

            • memory/1228-33-0x00000000029E0000-0x0000000002A24000-memory.dmp

              Filesize

              272KB

            • memory/1228-32-0x00000000029E0000-0x0000000002A24000-memory.dmp

              Filesize

              272KB

            • memory/1228-30-0x00000000029E0000-0x0000000002A24000-memory.dmp

              Filesize

              272KB

            • memory/1228-31-0x00000000029E0000-0x0000000002A24000-memory.dmp

              Filesize

              272KB

            • memory/1280-69-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-50-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-75-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-73-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-143-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-71-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-0-0x0000000000330000-0x0000000000374000-memory.dmp

              Filesize

              272KB

            • memory/1280-67-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-65-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-63-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-61-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-58-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-56-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-54-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-52-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-77-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-49-0x0000000002380000-0x00000000023C4000-memory.dmp

              Filesize

              272KB

            • memory/1280-45-0x0000000002380000-0x00000000023C4000-memory.dmp

              Filesize

              272KB

            • memory/1280-43-0x0000000002380000-0x00000000023C4000-memory.dmp

              Filesize

              272KB

            • memory/1280-79-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/1280-59-0x0000000077530000-0x0000000077531000-memory.dmp

              Filesize

              4KB

            • memory/1280-47-0x0000000002380000-0x00000000023C4000-memory.dmp

              Filesize

              272KB

            • memory/1280-41-0x0000000002380000-0x00000000023C4000-memory.dmp

              Filesize

              272KB

            • memory/1280-166-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1280-1-0x0000000000380000-0x00000000003E1000-memory.dmp

              Filesize

              388KB

            • memory/1280-2-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1280-3-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/1280-4-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2488-14-0x0000000001C30000-0x0000000001C74000-memory.dmp

              Filesize

              272KB

            • memory/2488-17-0x0000000001C80000-0x0000000001CE1000-memory.dmp

              Filesize

              388KB

            • memory/2488-19-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB

            • memory/2488-187-0x0000000000400000-0x0000000000444000-memory.dmp

              Filesize

              272KB