Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 19:39

General

  • Target

    c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219.exe

  • Size

    54KB

  • MD5

    0b8682a965d30e4729224e418509c49d

  • SHA1

    bb9bad85cdcbde445780c7f30766b754210f427b

  • SHA256

    c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219

  • SHA512

    b4ce15b8a12e638894775f4607993a51e8722ff2ad56327e280731dd0f9ee23eb44c2d5f34869aed2695be5c16160469fc25628f2c3bff4623a604aa6089630f

  • SSDEEP

    1536:OG57QfSEjxfy+H2oeUxPbLG/CPxeKbyaJRnoDLCE:FVQaEjxfdbtxPbNPxegOiE

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\SysWOW64\syscfg32.exe
      C:\Windows\system32\syscfg32.exe
      2⤵
      • Executes dropped EXE
      PID:5112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\syscfg32.exe

          Filesize

          54KB

          MD5

          0b8682a965d30e4729224e418509c49d

          SHA1

          bb9bad85cdcbde445780c7f30766b754210f427b

          SHA256

          c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219

          SHA512

          b4ce15b8a12e638894775f4607993a51e8722ff2ad56327e280731dd0f9ee23eb44c2d5f34869aed2695be5c16160469fc25628f2c3bff4623a604aa6089630f

        • C:\Windows\SysWOW64\syscfg32.exe

          Filesize

          54KB

          MD5

          0b8682a965d30e4729224e418509c49d

          SHA1

          bb9bad85cdcbde445780c7f30766b754210f427b

          SHA256

          c6d2ceca93cfbd0780e6e14939db5be8dba2ee525e7dd471b62139d0106f1219

          SHA512

          b4ce15b8a12e638894775f4607993a51e8722ff2ad56327e280731dd0f9ee23eb44c2d5f34869aed2695be5c16160469fc25628f2c3bff4623a604aa6089630f

        • memory/4844-135-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4844-137-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/5112-136-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB