Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-03-2024 09:13

General

  • Target

    d86f9b4228662e425a24fd1c13617087.exe

  • Size

    293KB

  • MD5

    d86f9b4228662e425a24fd1c13617087

  • SHA1

    0203e3d73b79d1560c9cb793241b0cb7a9686974

  • SHA256

    1ef7db195fc7d94d8761d52f07b57f9e284dae1008af96fea13ec96f205c8ce7

  • SHA512

    252cb4d558abe39c00ad4b89556ed3c4eddb6315ecf2e83198156997e01dedd078633bebae396435cbf8c29892e6f7bd1180bd94de18c682889b145125f06928

  • SSDEEP

    6144:bPdM9MANEVzGlcEDUl4qaRYVQLJTGbusJRhgnGXcLD7Xm2BeddhMHAO+9d:wNEh8cSLqdIsisDhgnG4BBedDMgO+P

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1220
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1352
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1412
          • C:\Users\Admin\AppData\Local\Temp\d86f9b4228662e425a24fd1c13617087.exe
            "C:\Users\Admin\AppData\Local\Temp\d86f9b4228662e425a24fd1c13617087.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\Users\Admin\AppData\Roaming\Juala\yjruu.exe
              "C:\Users\Admin\AppData\Roaming\Juala\yjruu.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1756
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp44156433.bat"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1128
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 116
                4⤵
                • Program crash
                • Suspicious use of WriteProcessMemory
                PID:2708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 536
                  5⤵
                  • Program crash
                  PID:2552
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:872
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "1186406822-1341058132-1551836569-412826823-142575701-755290104-6893394921249159978"
            1⤵
              PID:1640

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Raywyw\ewke.avi

              Filesize

              366B

              MD5

              318364d4079cdfe80fe8d52d3714da65

              SHA1

              4a212e4918fef4c47149d296b9144842a7560ab7

              SHA256

              3986d21088ab4205ae612bcb02f5e9f403863f0e9b0ff8e98dd2162b5821862d

              SHA512

              deeae353462560320cd00910a96e24724a0e696ec55b627f9b032879f9946f7db65f3159d859be36557a556249f66d4d35ff9fe441e2d2531a98b21aaa02751c

            • \Users\Admin\AppData\Roaming\Juala\yjruu.exe

              Filesize

              293KB

              MD5

              32c512f6f53f0933f863e27db93840d6

              SHA1

              acce3edb21139feeb3fb4399156cfe0e81bf6069

              SHA256

              1f2801c809cbec06b2cc4a709ff1c8759dfb0d672f63231d69e9693e8bed487c

              SHA512

              b1b6be2f2a3c9d7252a3512a3a1bc9b096819864ecf64736871a26babde8582cbf2f1a4e13b6314d4de7ec326f5288e936b6b51779ff48647ff83dda184f4f52

            • memory/872-44-0x0000000000340000-0x0000000000381000-memory.dmp

              Filesize

              260KB

            • memory/872-50-0x0000000000340000-0x0000000000381000-memory.dmp

              Filesize

              260KB

            • memory/872-48-0x0000000000340000-0x0000000000381000-memory.dmp

              Filesize

              260KB

            • memory/872-46-0x0000000000340000-0x0000000000381000-memory.dmp

              Filesize

              260KB

            • memory/1220-24-0x0000000000280000-0x00000000002C1000-memory.dmp

              Filesize

              260KB

            • memory/1220-22-0x0000000000280000-0x00000000002C1000-memory.dmp

              Filesize

              260KB

            • memory/1220-18-0x0000000000280000-0x00000000002C1000-memory.dmp

              Filesize

              260KB

            • memory/1220-26-0x0000000000280000-0x00000000002C1000-memory.dmp

              Filesize

              260KB

            • memory/1220-20-0x0000000000280000-0x00000000002C1000-memory.dmp

              Filesize

              260KB

            • memory/1352-31-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

              Filesize

              260KB

            • memory/1352-29-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

              Filesize

              260KB

            • memory/1352-33-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

              Filesize

              260KB

            • memory/1352-35-0x0000000001BB0000-0x0000000001BF1000-memory.dmp

              Filesize

              260KB

            • memory/1412-38-0x0000000002570000-0x00000000025B1000-memory.dmp

              Filesize

              260KB

            • memory/1412-39-0x0000000002570000-0x00000000025B1000-memory.dmp

              Filesize

              260KB

            • memory/1412-40-0x0000000002570000-0x00000000025B1000-memory.dmp

              Filesize

              260KB

            • memory/1412-41-0x0000000002570000-0x00000000025B1000-memory.dmp

              Filesize

              260KB

            • memory/1756-196-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1756-16-0x0000000001C30000-0x0000000001C7B000-memory.dmp

              Filesize

              300KB

            • memory/1756-19-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/1756-15-0x0000000001BE0000-0x0000000001C21000-memory.dmp

              Filesize

              260KB

            • memory/2240-55-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-66-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-4-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2240-54-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-5-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2240-56-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-57-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-60-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-63-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-64-0x0000000077D30000-0x0000000077D31000-memory.dmp

              Filesize

              4KB

            • memory/2240-62-0x0000000077D30000-0x0000000077D31000-memory.dmp

              Filesize

              4KB

            • memory/2240-59-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-58-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-2-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2240-68-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-70-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-72-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-74-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-76-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-78-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-80-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-82-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-154-0x0000000000880000-0x0000000000881000-memory.dmp

              Filesize

              4KB

            • memory/2240-0-0x00000000005F0000-0x0000000000631000-memory.dmp

              Filesize

              260KB

            • memory/2240-177-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2240-178-0x00000000007F0000-0x0000000000831000-memory.dmp

              Filesize

              260KB

            • memory/2240-1-0x00000000006C0000-0x000000000070B000-memory.dmp

              Filesize

              300KB