Analysis Overview
SHA256
5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78
Threat Level: Known bad
The file 5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78 was found to be: Known bad.
Malicious Activity Summary
Locky
Adds Run key to start application
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-07-13 14:53
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-07-13 14:53
Reported
2022-07-13 14:57
Platform
win10v2004-20220414-en
Max time kernel
169s
Max time network
192s
Command Line
Signatures
Locky
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\opt321 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe" | C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe
"C:\Users\Admin\AppData\Local\Temp\5b712f3ced695dd1510320494ecac67b277c0b386ee465303504c89431f87c78.exe"
Network
| Country | Destination | Domain | Proto |
| US | 93.184.220.29:80 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| UA | 91.203.5.183:80 | tcp | |
| US | 52.168.117.170:443 | tcp | |
| RU | 185.147.82.124:80 | tcp | |
| UA | 91.203.5.183:80 | tcp | |
| RU | 185.147.82.124:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| UA | 91.203.5.183:80 | tcp |
Files
memory/5064-131-0x0000000000400000-0x000000000049DAA4-memory.dmp
memory/5064-130-0x0000000000400000-0x0000000000489000-memory.dmp
memory/5064-133-0x0000000000400000-0x000000000049DAA4-memory.dmp
memory/5064-134-0x0000000000400000-0x000000000049DAA4-memory.dmp