Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 04:15

General

  • Target

    ffe6422dff4cbe7efdbd7ac4983504d4.exe

  • Size

    2.2MB

  • MD5

    ffe6422dff4cbe7efdbd7ac4983504d4

  • SHA1

    b67e47c4469476baa69803a3183f2c5a821ad5b1

  • SHA256

    db4d63069f8ba1604f971997cff723b7ed36153cd6b29d04ea0fc341236d9b26

  • SHA512

    626e085ef91b16ba1d2c7211de287854b4a7e85282ccc5a863aa3603f5249ad6dcd2ae2127142268341a5cc28d91ba4f6b9bab3bef268f35e3e683ee929bf499

  • SSDEEP

    49152:z79Bu1YpCIlTKgirv6NruEf9MpehiCcOIo8R+jl3W:zpBu2flTXmpehGOV8cjRW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffe6422dff4cbe7efdbd7ac4983504d4.exe
    "C:\Users\Admin\AppData\Local\Temp\ffe6422dff4cbe7efdbd7ac4983504d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\ffe6422dff4cbe7efdbd7ac4983504d4.exe
      "C:\Users\Admin\AppData\Local\Temp\ffe6422dff4cbe7efdbd7ac4983504d4.exe"
      2⤵
      • Drops file in Windows directory
      PID:2536
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {82B5CDC2-F370-4CF6-9783-27BEF3F3AD09} S-1-5-21-940600906-3464502421-4240639183-1000:MGWWAYYN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\ProgramData\obpfkgn\dxvf.exe
      C:\ProgramData\obpfkgn\dxvf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\ProgramData\obpfkgn\dxvf.exe
        "C:\ProgramData\obpfkgn\dxvf.exe"
        3⤵
        • Executes dropped EXE
        PID:2916
    • C:\ProgramData\obpfkgn\dxvf.exe
      C:\ProgramData\obpfkgn\dxvf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\ProgramData\obpfkgn\dxvf.exe
        "C:\ProgramData\obpfkgn\dxvf.exe"
        3⤵
        • Executes dropped EXE
        PID:3924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\obpfkgn\dxvf.exe

    Filesize

    2.2MB

    MD5

    ffe6422dff4cbe7efdbd7ac4983504d4

    SHA1

    b67e47c4469476baa69803a3183f2c5a821ad5b1

    SHA256

    db4d63069f8ba1604f971997cff723b7ed36153cd6b29d04ea0fc341236d9b26

    SHA512

    626e085ef91b16ba1d2c7211de287854b4a7e85282ccc5a863aa3603f5249ad6dcd2ae2127142268341a5cc28d91ba4f6b9bab3bef268f35e3e683ee929bf499

  • C:\Windows\Tasks\Test Task17.job

    Filesize

    218B

    MD5

    9e40d522caaab2499cadddbaa2904434

    SHA1

    9a1a40d6bd643c92e7fddd78c62c8b38aaa99a3f

    SHA256

    0d3e4bdbda0952e59bb6ea3dc656198e74e51e2ebb6ec58f3d9a66cf508c189a

    SHA512

    a484c8b994948c1c0a4058dcebe77b39d2b47363409b302e70ede88453bc23fcd2c238750b4a086d03b7c03331c7713c2b56fa274de3a1c849025447d70b6aee

  • memory/1688-4890-0x0000000072FCE000-0x0000000072FCF000-memory.dmp

    Filesize

    4KB

  • memory/1688-4889-0x0000000000E10000-0x0000000001040000-memory.dmp

    Filesize

    2.2MB

  • memory/2536-4883-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2740-9770-0x0000000000E10000-0x0000000001040000-memory.dmp

    Filesize

    2.2MB

  • memory/2936-45-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-39-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-3-0x00000000051D0000-0x00000000053EC000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-4-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-5-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-9-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-31-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-49-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-67-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-65-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-63-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-61-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-59-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-57-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-55-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-53-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-51-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-47-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-1-0x0000000000980000-0x0000000000BB0000-memory.dmp

    Filesize

    2.2MB

  • memory/2936-43-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-41-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-2-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2936-37-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-35-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-33-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-29-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-27-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-25-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-23-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-21-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-19-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-17-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-15-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-13-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-11-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-7-0x00000000051D0000-0x00000000053E5000-memory.dmp

    Filesize

    2.1MB

  • memory/2936-4866-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2936-4867-0x0000000004860000-0x00000000048BA000-memory.dmp

    Filesize

    360KB

  • memory/2936-4868-0x0000000004A40000-0x0000000004A8C000-memory.dmp

    Filesize

    304KB

  • memory/2936-0-0x000000007419E000-0x000000007419F000-memory.dmp

    Filesize

    4KB

  • memory/2936-4869-0x000000007419E000-0x000000007419F000-memory.dmp

    Filesize

    4KB

  • memory/2936-4870-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2936-4871-0x0000000004FC0000-0x0000000005014000-memory.dmp

    Filesize

    336KB

  • memory/2936-4886-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB