Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 23:21

General

  • Target

    964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e.exe

  • Size

    404KB

  • MD5

    3431676aa13a228c83de9bf6a3e13d0d

  • SHA1

    f4f640af34c83d31468cb5f470acc81732e52b11

  • SHA256

    964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e

  • SHA512

    b740860bfe90f0932e7fde2e8640c3b7236fabe8aa11656c37129db41e401f77d7aa9eb98419ee5ce318acbf4bbb8882d96d76799573d64c36350acedd41550b

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH45:gtRfJcNYFNm8UhlZGse5

Malware Config

Signatures

  • Blocklisted process makes network request 10 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e.exe
    "C:\Users\Admin\AppData\Local\Temp\964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\sygoxm.exe "C:\Users\Admin\AppData\Local\Temp\964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:2072
      • C:\Users\Admin\AppData\Local\Temp\sygoxm.exe
        C:\Users\Admin\AppData\Local\Temp\\sygoxm.exe "C:\Users\Admin\AppData\Local\Temp\964957654458098c56d8d22a6ecada1a40d4343e00ad38dd3865084ff8bef10e.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2716
        • \??\c:\windows\SysWOW64\rundll32.exe
          c:\windows\system32\rundll32.exe "c:\Program Files\whggs\odrwx.dll",Verify C:\Users\Admin\AppData\Local\Temp\sygoxm.exe
          4⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\Program Files\whggs\odrwx.dll

    Filesize

    228KB

    MD5

    69b3e375d4e4917e5b6f584586d6dbb3

    SHA1

    875152b7d8e9031347b2d5166811d4fac06ccbbb

    SHA256

    1d5da6d987ba676d6bfbc3ed5a9217087a25a300468159f46d82c7e59b928595

    SHA512

    b92a02c156f5bebf11d3030707189bbe3702bda73d52d06490c6facdb008658e1a38e46ec72533da7ac1e85a2fd8af3874e877c4092ea060c219753e36a4ba8b

  • \Users\Admin\AppData\Local\Temp\sygoxm.exe

    Filesize

    405KB

    MD5

    64a51412bc45001acf461bb6ce80f586

    SHA1

    38d443de45bdcea55878800fcc031f082c757749

    SHA256

    753c80fb468b97803cd538960bd0895a9480956c346a45fb716fd92190acedf8

    SHA512

    b9e66c0ad8a93249e5736684cbbd4bd4e56ad8548ff28163629ad2b75a90d0944c458f737f57ce89a15229316eddd04559e03b69e36efc4d5f570cfb9d60d3ab

  • memory/1152-0-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/1152-2-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2240-5-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2716-9-0x0000000000400000-0x0000000000464000-memory.dmp

    Filesize

    400KB

  • memory/2952-15-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2952-16-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2952-17-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2952-18-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2952-19-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB

  • memory/2952-21-0x0000000010000000-0x0000000010080000-memory.dmp

    Filesize

    512KB