Resubmissions

18-10-2022 15:34

221018-sztdkagehl 10

03-09-2020 14:49

200903-lpctvnhxfn 10

Analysis

  • max time kernel
    81s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    03-09-2020 14:49

General

  • Target

    4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe

  • Size

    12.6MB

  • MD5

    d427390e9fad598ec3288c9275c84628

  • SHA1

    7b88e1eaa07151fc0d7639574fc7f40fa5be8aa3

  • SHA256

    4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6

  • SHA512

    83ecc48386999ec6d05999d88e9a81eae5267ea807441727cd60d44f17ead8a0ca6e8a0ffa7d5e4e9fc800d858fb2ee824815abe4299e0ec85639384b75324a8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 32 IoCs
  • JavaScript code in executable 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe
    "C:\Users\Admin\AppData\Local\Temp\4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Local\Temp\4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe
      "C:\Users\Admin\AppData\Local\Temp\4b76ad80e9ce4c503bde0e476a88447426fc38315d440d22926627295e1b0ec6.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:3528
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads