Analysis

  • max time kernel
    180s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 22:27

General

  • Target

    RequestHunter 2.0.exe

  • Size

    7.0MB

  • MD5

    4b6873d2dbcd249a27dc6c47aa944b11

  • SHA1

    45710010f7f00a7eda0b4f00192a298f51b2b1d2

  • SHA256

    c65b8fc5deb896c6d4ffc871f980522f10d6342a0ea674fcc6c6db1fa53a9382

  • SHA512

    9014984aeaccfd8ba6bc02450a78ab0b3073534218d3accdbb3fd35548e74b90e95a7b41a4911b2382dd261245d6df4a9293617fde48e5ce3120cf58942b6ae0

  • SSDEEP

    98304:mKAtCV/iz5KhVIY57jsN8KDIqFAP2A4XMRppa0UZWqxiFQSncCr1K7IuzjV4CIh:Eu45yN7AN8KDIqFtd8R4ZW1FQkpYpA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RequestHunter 2.0.exe
    "C:\Users\Admin\AppData\Local\Temp\RequestHunter 2.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\RequestHunter.exe
      "C:\Users\Admin\AppData\Local\Temp\RequestHunter 2.0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c
        3⤵
          PID:2152
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          3⤵
            PID:3716
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3292
        • C:\Windows\system32\mstsc.exe
          "C:\Windows\system32\mstsc.exe"
          1⤵
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:4272
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
          1⤵
            PID:4576

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_asyncio.pyd

            Filesize

            63KB

            MD5

            511a52bcb0bd19eda7aa980f96723c93

            SHA1

            b11ab01053b76ebb60ab31049f551e5229e68ddd

            SHA256

            d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394

            SHA512

            d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_overlapped.pyd

            Filesize

            49KB

            MD5

            ac053ef737e4f13b02bfa81f9e46170b

            SHA1

            5d8ebeb30671b74d736731696fedc78c89da0e1f

            SHA256

            cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f

            SHA512

            6ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

            Filesize

            4.9MB

            MD5

            7a6a8c2a8c379b111cdceb66b18d687d

            SHA1

            f3b8a4c731fa0145f224112f91f046fddf642794

            SHA256

            8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b

            SHA512

            f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

          • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

            Filesize

            38KB

            MD5

            0f8e4992ca92baaf54cc0b43aaccce21

            SHA1

            c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

            SHA256

            eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

            SHA512

            6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\RequestHunter.exe

            Filesize

            9.9MB

            MD5

            26c1286a9c6baadcdba50169a69a61f2

            SHA1

            7a60d8f55701bd75885fa7c9dafb924cebdc8502

            SHA256

            fefb2984560fd846e733d902a1740e5e3d68733b82c8d6aac68f8fb3023594e3

            SHA512

            3c4e4ad1d0a70367571f93ceff07d00720b87c37faf75e372cd06a9dc270a8aabbfa8700ed844d132d604f03df603dcdde4ad4d0fb541303836f0d8dc1b8cc15

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\VCRUNTIME140.dll

            Filesize

            106KB

            MD5

            49c96cecda5c6c660a107d378fdfc3d4

            SHA1

            00149b7a66723e3f0310f139489fe172f818ca8e

            SHA256

            69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

            SHA512

            e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_bz2.pyd

            Filesize

            82KB

            MD5

            4438affaaa0ca1df5b9b1cdaa0115ec1

            SHA1

            4eda79eaf3de614d5f744aa9eea5bfcf66e2d386

            SHA256

            ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85

            SHA512

            6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_ctypes.pyd

            Filesize

            120KB

            MD5

            6114277c6fc040f68d25ca90e25924cd

            SHA1

            028179c77cb3ba29cd8494049421eaa4900ccd0e

            SHA256

            f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656

            SHA512

            76e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_decimal.pyd

            Filesize

            247KB

            MD5

            be315973aff9bdeb06629cd90e1a901f

            SHA1

            151f98d278e1f1308f2be1788c9f3b950ab88242

            SHA256

            0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725

            SHA512

            8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_lzma.pyd

            Filesize

            155KB

            MD5

            737119a80303ef4eccaa998d500e7640

            SHA1

            328c67c6c4d297ac13da725bf24467d8b5e982e3

            SHA256

            7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28

            SHA512

            1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_socket.pyd

            Filesize

            77KB

            MD5

            64a6c475f59e5c57b3f4dd935f429f09

            SHA1

            ca2e0719dc32f22163ae0e7b53b2caadb0b9d023

            SHA256

            d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49

            SHA512

            cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\_ssl.pyd

            Filesize

            172KB

            MD5

            a0b40f1f8fc6656c5637eacacf7021f6

            SHA1

            38813e25ffde1eee0b8154fa34af635186a243c1

            SHA256

            79d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1

            SHA512

            c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\libssl-3.dll

            Filesize

            771KB

            MD5

            64acb046fe68d64ee475e19f67253a3c

            SHA1

            d9e66c9437ce6f775189d6fdbd171635193ec4cc

            SHA256

            b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10

            SHA512

            f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\python311.dll

            Filesize

            5.5MB

            MD5

            58e01abc9c9b5c885635180ed104fe95

            SHA1

            1c2f7216b125539d63bd111a7aba615c69deb8ba

            SHA256

            de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837

            SHA512

            cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

          • C:\Users\Admin\AppData\Local\Temp\onefile_4776_133654696854748310\select.pyd

            Filesize

            29KB

            MD5

            653bdccb7af2aa9ccf50cb050fd3be64

            SHA1

            afe0a85425ae911694c250ab4cb1f6c3d3f2cc69

            SHA256

            e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279

            SHA512

            07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

          • memory/2768-56-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/2768-60-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/2768-62-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/2768-66-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/2768-68-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/2768-73-0x00007FF717C10000-0x00007FF71860B000-memory.dmp

            Filesize

            10.0MB

          • memory/4776-55-0x00007FF6B06B0000-0x00007FF6B0DCF000-memory.dmp

            Filesize

            7.1MB

          • memory/4776-79-0x00007FF6B06B0000-0x00007FF6B0DCF000-memory.dmp

            Filesize

            7.1MB