Analysis

  • max time kernel
    148s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-06-2022 15:54

General

  • Target

    28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe.exe

  • Size

    523KB

  • MD5

    5473ca365a16752d4f366ed7fb157b26

  • SHA1

    ff1f1da4a447f7ce24df960376f26dbf296f6a2e

  • SHA256

    28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe

  • SHA512

    ef25f88aeb3e424632b5136023cb4beb62c1b26957dcaf95a092d6082e91a87b25e72bdce7dacbe90bff1cabcf1fd662158ce2df716862e3e67f9f70db218f6b

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe.exe
    "C:\Users\Admin\AppData\Local\Temp\28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe.exe"
    1⤵
    • NTFS ADS
    • Suspicious use of WriteProcessMemory
    PID:3196
    • \??\c:\programdata\3f506c878b\pmwin.exe
      c:\programdata\3f506c878b\pmwin.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\3f506c878b
        3⤵
          PID:4076
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x3fc 0x418
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2536

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\0
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\ProgramData\3f506c878b\pmwin.exe
      Filesize

      523KB

      MD5

      5473ca365a16752d4f366ed7fb157b26

      SHA1

      ff1f1da4a447f7ce24df960376f26dbf296f6a2e

      SHA256

      28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe

      SHA512

      ef25f88aeb3e424632b5136023cb4beb62c1b26957dcaf95a092d6082e91a87b25e72bdce7dacbe90bff1cabcf1fd662158ce2df716862e3e67f9f70db218f6b

    • \??\c:\programdata\3f506c878b\pmwin.exe
      Filesize

      523KB

      MD5

      5473ca365a16752d4f366ed7fb157b26

      SHA1

      ff1f1da4a447f7ce24df960376f26dbf296f6a2e

      SHA256

      28f7a4f024d6872538bff9f2de2aa2aa726e55b23ac51e8f142d830027639dfe

      SHA512

      ef25f88aeb3e424632b5136023cb4beb62c1b26957dcaf95a092d6082e91a87b25e72bdce7dacbe90bff1cabcf1fd662158ce2df716862e3e67f9f70db218f6b

    • memory/3196-133-0x0000000000140000-0x0000000000150000-memory.dmp
      Filesize

      64KB

    • memory/3744-130-0x0000000000000000-mapping.dmp
    • memory/3744-134-0x0000000000640000-0x0000000000650000-memory.dmp
      Filesize

      64KB

    • memory/4076-136-0x0000000000000000-mapping.dmp