Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 05:57

General

  • Target

    files/10.exe

  • Size

    56KB

  • MD5

    3316d124b26e337d968f1a224b9dbec5

  • SHA1

    c2ee282a3e1205cf19ff28a9e811e5dcd565558a

  • SHA256

    daa68b22e69d67c9f0066b5172aa0a56db69e1dce48a9f916cc84be66e0792f9

  • SHA512

    4cf4dcfca4b3abf3bdfa4f39e2f47e0320c4a8f1582841deec001a7f8c3cb83f2fcc3596730500e02a58d6b83cf17bf8d4e8b59300b4ebed66dbba24a9f9c800

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\files\10.exe
    "C:\Users\Admin\AppData\Local\Temp\files\10.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"
      2⤵
      • Drops startup file
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"
        3⤵
          PID:2392

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dZlNApdygP.txt
      Filesize

      46B

      MD5

      df4e66e161bac42da76cd58f1a802b9a

      SHA1

      59579af147c053a31e45bf0b54dc4210d6e5cf94

      SHA256

      9b1e147525e71810533ec9a39e37bdb8758a614e4faecdf341aca501f8a7f40c

      SHA512

      dcafda04110e6ceaa9c8496a4dd113f9303a994aca79f61bce472dfd8915295adb736e2607dc03c0eaf194358fced65ba257eb64dc130902ea900f1518b6e619

    • memory/2392-135-0x0000000000000000-mapping.dmp
    • memory/2392-138-0x00000000746B0000-0x0000000074C61000-memory.dmp
      Filesize

      5.7MB

    • memory/3068-131-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/3068-132-0x000000000040E5CE-mapping.dmp
    • memory/3068-133-0x00000000746B0000-0x0000000074C61000-memory.dmp
      Filesize

      5.7MB

    • memory/3068-134-0x00000000746B0000-0x0000000074C61000-memory.dmp
      Filesize

      5.7MB

    • memory/4712-130-0x00007FFA59F60000-0x00007FFA5A996000-memory.dmp
      Filesize

      10.2MB