Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 15:36

General

  • Target

    d67b451c8db3e0babe2dad4c94c5e786.exe

  • Size

    905KB

  • MD5

    d67b451c8db3e0babe2dad4c94c5e786

  • SHA1

    c337ce6310cfaf74ad257ea08d56377187385c5b

  • SHA256

    226e8dff03a2cde7b37c15d453584b8693d26e30a7321b0e2e45b5fe44cd94d2

  • SHA512

    48755ab9e72fb70f065015427aadf7c796f4dcf70fe9d197a7070ab345ebad9b40aaed0bac162f524777299d2dcc076bd3fc9729a7c62e7953fa543fbdb5d66f

  • SSDEEP

    24576:F+g1zsXRoWC8DZgLr2vY6f0iRq/dDPGyKO8KVWhBSXlQzD6MYA:7X6M2t8iRidmKEfSA6lA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d67b451c8db3e0babe2dad4c94c5e786.exe
    "C:\Users\Admin\AppData\Local\Temp\d67b451c8db3e0babe2dad4c94c5e786.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\QuvLw.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2612
    • C:\Users\Admin\AppData\Roaming\Run32.exe
      "C:\Users\Admin\AppData\Roaming\Run32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Roaming\Run32.exe
        C:\Users\Admin\AppData\Roaming\Run32.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
          "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
            C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2544
            • C:\Users\Admin\AppData\Local\Temp\miner.exe
              "C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://pool.bitclockers.com:8332 -u danf6098 -p test6098 -t 1
              6⤵
              • Executes dropped EXE
              PID:2004
            • C:\Users\Admin\AppData\Local\Temp\unzip.exe
              "C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip
              6⤵
              • Executes dropped EXE
              PID:856
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
          4⤵
            PID:1892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\QuvLw.bat

      Filesize

      134B

      MD5

      52dd81881fa3a9e2f376bb73bde15b00

      SHA1

      9440375fb9fb0368f982754f76e2efd295b25463

      SHA256

      a937077f0e234149b1e15e413d33c9f55ad3f427be87d806719c96b3b95209a2

      SHA512

      80c8f687f6c58bd0549c29e7df64fa5585fa877ac5505a72772ba0cae44b01397bd4e2c217681f8662ea5aff69f115c3fbc306c6b1c3e33d9089aa4f887d2fb0

    • C:\Users\Admin\AppData\Local\Temp\Tar1E51.tmp

      Filesize

      96KB

      MD5

      f61d328ec0d6e902392be9dfa45e0fb9

      SHA1

      cf01cb85e1f0eba70921756c61202036c2cb4b32

      SHA256

      8487d799b2015871a4cde0b6c1f093374a76a654d4aada5fcfda8b03c1280563

      SHA512

      0a858fc3a4bc9d50638e30703e74e08a444c62add946ac102d5d44427a214263d2e1737ba13a1c5c99626c0036216b1948bb77221a5e44fa7880b3c868f0284f

    • C:\Users\Admin\AppData\Local\Temp\help.bat

      Filesize

      98B

      MD5

      33a78de2abb4b7a769e78b6b9684ccd6

      SHA1

      bbdade2f8ae1daa4950f02aaec037a54d9f350a4

      SHA256

      fbefb6d6d38109b8ef7a2118aa479dc0da35d878a46332d06d7e36c738b8533c

      SHA512

      9df3cbd2e8b016a7dd5e135c913a8a123876cb526eec5899fbb1e890b51b0e4fc52a4e9630dfc3dfef454c9cc8dbd213e65561617fe3d8785e4f4899d6752e0a

    • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

      Filesize

      469KB

      MD5

      d6bd399feddd72244f99303c76273bb2

      SHA1

      962996006c1b096310bb94656d60b65ce87f3ff5

      SHA256

      b1d412f1422b6c8ff5166d37708d0d493fb1ae156da88f7addbf2669f72f962f

      SHA512

      3de6b90777414c51e898d82db621ef7fb152b244fc3cb03c718cc05d154abe5046915a0610e7c38f7087b1a884cfc47a8f4cf3ead5b2b628c5cb9a0b99a094ed

    • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

      Filesize

      79KB

      MD5

      37a0a7b41b37082ed7fb20c72fc74e62

      SHA1

      8a6f00409f0dee77cb454dd813ec24b0a07d6f2c

      SHA256

      cffba462f5386f73f735fe993664c673d7f2e936deef031bae0ff65cd75cf02c

      SHA512

      8c2713cfb166de6a00c6b21830dc44c03c629ac0488736933b70cfe886aa36fb5ee8ac05c95d4f66b075e9b2bafdecbb06ff670f3a7f64cfc31a5f03fec425c3

    • C:\Users\Admin\AppData\Local\Temp\unzip.exe

      Filesize

      164KB

      MD5

      75375c22c72f1beb76bea39c22a1ed68

      SHA1

      e1652b058195db3f5f754b7ab430652ae04a50b8

      SHA256

      8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

      SHA512

      1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

    • \Users\Admin\AppData\Local\Temp\miner.exe

      Filesize

      726KB

      MD5

      3b4986e5d94d0e5723eea640a6735769

      SHA1

      eab3272d5ef1038bf3d336d2b033b813403a9ff2

      SHA256

      8b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9

      SHA512

      efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965

    • \Users\Admin\AppData\Local\Temp\udpconmain.exe

      Filesize

      589KB

      MD5

      a45af87084eb94fb4cd262fa4e958edc

      SHA1

      34343f4d0371fc3012b6586ae102fbfb1f670bb9

      SHA256

      f8e9ab02e89cdcab4a7c6e1c3a5b0e86c6fcd73ba5180917d1d418c327395940

      SHA512

      686f75e07818290a187f4bdb847117bd22063e1b0c0f64784813a57f53a7c8bc780ff3cbe83bd1de6e72a90bfafa69ff74fc98853710e586c9e3c1c0076cb072

    • \Users\Admin\AppData\Local\Temp\udpconmain.exe

      Filesize

      576KB

      MD5

      770a1ec1035c0fcef06c07afdfd5f5ca

      SHA1

      f1a6b45f165efe7cf027ca53db67af6a15b137ea

      SHA256

      58377c5fc047f6731f261f78840de9691e6d237c08dc9fc9e4b8d097d27d1fef

      SHA512

      3565fd641dad02a40cf50fb9ac799d854d427d7c62e69816caabcdba995de13320a4c0726f8d3eafee7ec0b8f80ded9cf90f6ef45617e0bd43d9f2c9c54bcdca

    • \Users\Admin\AppData\Local\Temp\udpconmain.exe

      Filesize

      70KB

      MD5

      ae3902efc73eb6af00443e6c960f3216

      SHA1

      5f2ceda5cfa4f276d94acbf3b0f46690e63edbb8

      SHA256

      257953a5f4c2f0a399668ec2fdc14f471640853d5013b6c86a06eb9489916fde

      SHA512

      b08925169a64e40744bf4874859e14ba78dd46577ac3cdb9bfca5723a0c4ae60eac51a08be89b534607ce73b8a06bbe3bf415af550cafa77554c03abdf8ba194

    • \Users\Admin\AppData\Roaming\Run32.exe

      Filesize

      905KB

      MD5

      d67b451c8db3e0babe2dad4c94c5e786

      SHA1

      c337ce6310cfaf74ad257ea08d56377187385c5b

      SHA256

      226e8dff03a2cde7b37c15d453584b8693d26e30a7321b0e2e45b5fe44cd94d2

      SHA512

      48755ab9e72fb70f065015427aadf7c796f4dcf70fe9d197a7070ab345ebad9b40aaed0bac162f524777299d2dcc076bd3fc9729a7c62e7953fa543fbdb5d66f

    • memory/2204-98-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2204-87-0x00000000034E0000-0x0000000003DB9000-memory.dmp

      Filesize

      8.8MB

    • memory/2240-0-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2240-37-0x0000000004090000-0x0000000004969000-memory.dmp

      Filesize

      8.8MB

    • memory/2240-36-0x0000000004090000-0x0000000004969000-memory.dmp

      Filesize

      8.8MB

    • memory/2240-35-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2544-177-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2544-180-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2672-45-0x0000000003410000-0x0000000003CE9000-memory.dmp

      Filesize

      8.8MB

    • memory/2672-55-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2672-39-0x0000000000400000-0x0000000000CD9000-memory.dmp

      Filesize

      8.8MB

    • memory/2832-56-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-58-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-59-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-57-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-78-0x0000000002FC0000-0x0000000003899000-memory.dmp

      Filesize

      8.8MB

    • memory/2832-79-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-52-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-50-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2832-48-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-46-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-43-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2832-80-0x0000000002FC0000-0x0000000003899000-memory.dmp

      Filesize

      8.8MB

    • memory/2832-181-0x0000000002FC0000-0x0000000003899000-memory.dmp

      Filesize

      8.8MB