Resubmissions

14-04-2022 13:04

220414-qa3vlahfek 10

31-03-2022 14:57

220331-sb2p2adfa4 8

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    14-04-2022 13:04

General

  • Target

    NWASW.exe

  • Size

    1.4MB

  • MD5

    f50b3a031cb4b833464495e0241bda98

  • SHA1

    54c66169986c8a238aa0e6cf5fb537e31a9f716a

  • SHA256

    8a5492235174eed38c4ed85ce6a13f0076cb73c50fb8f1cad704551403a85e63

  • SHA512

    37b27936616e0d3d4a7cc395896da6c21f6a2412e789ee48ee53fe0521f5ee65acf7b3b8ea602ec6aab0fe2cd52a927fb054c6e2a20624d6512e0f99a809c562

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

    suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NWASW.exe
    "C:\Users\Admin\AppData\Local\Temp\NWASW.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads