Analysis

  • max time kernel
    229s
  • max time network
    233s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 16:27

General

  • Target

    ce0c1ef791a24ee3b0df441926421a8cae5d785a46741d8f0fcc28f2a523730d.exe

  • Size

    2.4MB

  • MD5

    554c30366b3fc26e19239dbe08e79fbc

  • SHA1

    b5b5e980d392c02d28cd3b63a945b1222dcbf49e

  • SHA256

    ce0c1ef791a24ee3b0df441926421a8cae5d785a46741d8f0fcc28f2a523730d

  • SHA512

    3f9524f2c988b0df55b8037db7cfaea9aba75dd1e5efa814e3270e53900556b9daa2ce312a845c210d3507bc1bec05c3e7b837ae37867e2265eb984437ad2516

Score
10/10

Malware Config

Signatures

  • Detected adobe phishing page
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce0c1ef791a24ee3b0df441926421a8cae5d785a46741d8f0fcc28f2a523730d.exe
    "C:\Users\Admin\AppData\Local\Temp\ce0c1ef791a24ee3b0df441926421a8cae5d785a46741d8f0fcc28f2a523730d.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1840

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1840-130-0x0000000000530000-0x0000000000CBA000-memory.dmp
    Filesize

    7.5MB