Analysis

  • max time kernel
    78s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    05-02-2022 12:17

General

  • Target

    9e2a002527bd520f50a4844c8381e89a09e3489a239766120d63db503eb97910.exe

  • Size

    378KB

  • MD5

    d0d25ddde9388ab0feb47b9ec3cb7733

  • SHA1

    de6f89f2c17b229a0068a75bf476720a0724fe18

  • SHA256

    9e2a002527bd520f50a4844c8381e89a09e3489a239766120d63db503eb97910

  • SHA512

    25d76db3137a9ee2b0fd9a4e562a6cb89fba025a787e443f0361580b0d7fdbe43f5ebe99c204103939f01a4fedc2e1182aea90b69d3833d001141280805c386f

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e2a002527bd520f50a4844c8381e89a09e3489a239766120d63db503eb97910.exe
    "C:\Users\Admin\AppData\Local\Temp\9e2a002527bd520f50a4844c8381e89a09e3489a239766120d63db503eb97910.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:2228
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:5096

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/824-130-0x00000000004F0000-0x0000000000554000-memory.dmp

      Filesize

      400KB

    • memory/824-131-0x0000000004DA0000-0x0000000004E06000-memory.dmp

      Filesize

      408KB

    • memory/824-132-0x0000000004EB0000-0x0000000004F42000-memory.dmp

      Filesize

      584KB

    • memory/824-133-0x0000000005120000-0x00000000052E2000-memory.dmp

      Filesize

      1.8MB

    • memory/824-134-0x0000000004D30000-0x0000000004D52000-memory.dmp

      Filesize

      136KB

    • memory/824-135-0x0000000004E10000-0x0000000004E32000-memory.dmp

      Filesize

      136KB

    • memory/824-136-0x00000000058A0000-0x0000000005E44000-memory.dmp

      Filesize

      5.6MB

    • memory/824-137-0x00000000052F0000-0x0000000005894000-memory.dmp

      Filesize

      5.6MB

    • memory/824-151-0x0000000005590000-0x00000000055D4000-memory.dmp

      Filesize

      272KB

    • memory/2228-152-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/5096-150-0x0000016035B90000-0x0000016035B94000-memory.dmp

      Filesize

      16KB