Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 22:29

General

  • Target

    d88a7cb863f1f923fabd02d62504953b92fa108556cea4248d1efaca5a4a7d04.exe

  • Size

    25KB

  • MD5

    a88e90735d00e914ac9762c48dd3a96d

  • SHA1

    862b0d59940bcdc752fecfe74aaa67e7d70eb3ab

  • SHA256

    d88a7cb863f1f923fabd02d62504953b92fa108556cea4248d1efaca5a4a7d04

  • SHA512

    6c9e4eb1b0e63f793d540c0de2da75b1da8aed4a3c5de89b04677b339bdd5ca3b18b516c0f004305ed508a98f67014452cf993fd03deba5e58016c4c1e2410f3

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d88a7cb863f1f923fabd02d62504953b92fa108556cea4248d1efaca5a4a7d04.exe
    "C:\Users\Admin\AppData\Local\Temp\d88a7cb863f1f923fabd02d62504953b92fa108556cea4248d1efaca5a4a7d04.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4580

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4580-130-0x0000000000ED0000-0x0000000000ED8000-memory.dmp
    Filesize

    32KB

  • memory/4580-131-0x00007FF8BA280000-0x00007FF8BAD41000-memory.dmp
    Filesize

    10.8MB