Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    24-07-2021 15:03

General

  • Target

    04436C72506D84210A597C57880DBE3E.exe

  • Size

    1.4MB

  • MD5

    04436c72506d84210a597c57880dbe3e

  • SHA1

    d77bf018b1fa76215f2ca680e4cf25ad034eb271

  • SHA256

    87fbd9577039b209cd0ce825d1c79aad0def611625b737fa3abe70802da4d6f4

  • SHA512

    4dcfcc70d77c0fcf0fc74622f37cd176f0130bf8158330a6588d6c4c5bfcafc082dd003d514a10bbb01b12af575a3558d6255e65fd6ca90204e886d3f6a92064

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04436C72506D84210A597C57880DBE3E.exe
    "C:\Users\Admin\AppData\Local\Temp\04436C72506D84210A597C57880DBE3E.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1084

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-59-0x00000000752F1000-0x00000000752F3000-memory.dmp
    Filesize

    8KB