Analysis

  • max time kernel
    4294210s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    20/03/2022, 10:58

General

  • Target

    SusLocker.exe

  • Size

    279KB

  • MD5

    8d5cef4eb91bf64fef25150ca1d32b6f

  • SHA1

    58b2f1152e825fb7dc5e9e70d820ebe150d074ac

  • SHA256

    4fe81b8a0a09246218ba83f8f519c4edc7ed579d786865c2c56f6a386bf40b43

  • SHA512

    f2036e436a953e7b34338f18dedffad3e7c42e9484bf8e9ac2be0ce67edd5eee0d74ab17fba3a64ebf0607c494c34d3a8fe6f19a5d728d0ab7239147ecdddcad

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SusLocker.exe
    "C:\Users\Admin\AppData\Local\Temp\SusLocker.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of FindShellTrayWindow
    PID:1248
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:704
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x180
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:964

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/704-58-0x000007FEFBE31000-0x000007FEFBE33000-memory.dmp

      Filesize

      8KB

    • memory/1248-54-0x0000000001090000-0x00000000010DC000-memory.dmp

      Filesize

      304KB

    • memory/1248-56-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

      Filesize

      4KB

    • memory/1248-55-0x0000000074820000-0x0000000074F0E000-memory.dmp

      Filesize

      6.9MB

    • memory/1248-57-0x0000000004BF5000-0x0000000004C06000-memory.dmp

      Filesize

      68KB