Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 21:01

General

  • Target

    42c72f515a28a2465a57e8e2374ea9ea827172e4999e75e6a786a766236011e0.exe

  • Size

    71KB

  • MD5

    52567479f68068d365c58c78a5f71b1b

  • SHA1

    040258d09fc7fb974bca9e214416a5a806a2e3b8

  • SHA256

    42c72f515a28a2465a57e8e2374ea9ea827172e4999e75e6a786a766236011e0

  • SHA512

    3bb1003acf142a35bca807a477d292f3240d077193ae40530e8fba2da2c88f92a7701024c37b49d9e2ed85e9f47784385fd7d58e6a5eac95633dea3fe3fa1689

  • SSDEEP

    1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8sl6:Olg35GTslA5t3/w8F

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Modifies WinLogon 2 TTPs 5 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\42c72f515a28a2465a57e8e2374ea9ea827172e4999e75e6a786a766236011e0.exe
          "C:\Users\Admin\AppData\Local\Temp\42c72f515a28a2465a57e8e2374ea9ea827172e4999e75e6a786a766236011e0.exe"
          2⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Windows\SysWOW64\oucmohoat.exe
            "C:\Windows\system32\oucmohoat.exe"
            3⤵
            • Windows security bypass
            • Modifies Installed Components in the registry
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Modifies WinLogon
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1844
            • C:\Windows\SysWOW64\oucmohoat.exe
              --k33p
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3016

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\ihcexam-eafat.exe

              Filesize

              74KB

              MD5

              8e939a4f264692c2ad5b4b523e977a20

              SHA1

              d11f18f548659ae87ca04b8b6485ecc86c651da1

              SHA256

              f2f371809566a0fe11b07ea714d7bed41004d740b832dd8b2b23e54aed24a705

              SHA512

              4c7c681ae16ca7fe21d0ca4f51d1bb3ad29ee70fc2cd8f63602beb7e58e650928aa9086d614485734bbc85842ded5e026c012412820a98ff52da36bfe4179ec6

            • C:\Windows\SysWOW64\oucmohoat.exe

              Filesize

              71KB

              MD5

              52567479f68068d365c58c78a5f71b1b

              SHA1

              040258d09fc7fb974bca9e214416a5a806a2e3b8

              SHA256

              42c72f515a28a2465a57e8e2374ea9ea827172e4999e75e6a786a766236011e0

              SHA512

              3bb1003acf142a35bca807a477d292f3240d077193ae40530e8fba2da2c88f92a7701024c37b49d9e2ed85e9f47784385fd7d58e6a5eac95633dea3fe3fa1689

            • C:\Windows\SysWOW64\oulxekoas-eafix.exe

              Filesize

              73KB

              MD5

              b2890532589bd623d57c83862120bc30

              SHA1

              8c3e2315d9546e31dca3ce863982b302d32d36f1

              SHA256

              46d5d21c3794482ca05e1ea1d7f11c4e322073307865ed43a364e0a7caaf31b9

              SHA512

              bc5ad22d21c2cbc0d0ba8116d612be6d428f9732cfe2b3b852f53f531f66cc795b9c6b2d292310e0e6f3bfca250f1e0661abb66ce663b8ba6e4abcf1df411599

            • C:\Windows\SysWOW64\ovlooxon-iseab.dll

              Filesize

              5KB

              MD5

              f37b21c00fd81bd93c89ce741a88f183

              SHA1

              b2796500597c68e2f5638e1101b46eaf32676c1c

              SHA256

              76cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0

              SHA512

              252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4

            • memory/1844-55-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/2176-9-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB

            • memory/3016-56-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB