Analysis

  • max time kernel
    155s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 12:45

General

  • Target

    IMG.exe

  • Size

    790KB

  • MD5

    e37eaf4e6ba3f8f3c7ae69fe64fab426

  • SHA1

    2371f3f0b6f993a6a85016764fc515e21318acd6

  • SHA256

    686fa9c6fbea4f0c7ef43e699dc0635cde676b7e9b85846543367a0530c36b0d

  • SHA512

    eb833ba22f65f3dbceaafa87ab0e3f329cd710849dc08e8dd6972e2a291cb7ddceb90daabfa613e6310e18879e762ffaf051a8c10e36fd264b8f58eecf107142

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3400

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3400-130-0x0000000000ED0000-0x0000000000F9C000-memory.dmp
    Filesize

    816KB

  • memory/3400-131-0x0000000005FF0000-0x0000000006594000-memory.dmp
    Filesize

    5.6MB

  • memory/3400-132-0x0000000005970000-0x0000000005A02000-memory.dmp
    Filesize

    584KB

  • memory/3400-133-0x0000000005B90000-0x0000000005C2C000-memory.dmp
    Filesize

    624KB

  • memory/3400-134-0x0000000005DE0000-0x0000000005E46000-memory.dmp
    Filesize

    408KB