Analysis

  • max time kernel
    175s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2022, 21:15

General

  • Target

    a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f.exe

  • Size

    194KB

  • MD5

    6673aa915e167fe63f48058d46ca7700

  • SHA1

    78ace7f8dcfd7dbfd770c9f5ecb80ec2c7b3286a

  • SHA256

    a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f

  • SHA512

    2676f040cf7867e4f0cd42e9547a68fcc04aaa3dedd7623b99585a77fa94e45e2465a6640f788f2ba1ac5aac0275281794ae8b9c4ac26a04c493686baeb61cac

  • SSDEEP

    1536:8VZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApEnlElwpYxnrBfy:snxwgxgfR/DVG7wBpEn+ts

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f.exe
    "C:\Users\Admin\AppData\Local\Temp\a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2032
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 204
            4⤵
            • Program crash
            PID:2624
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3828
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2024
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3420
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3420 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2032 -ip 2032
      1⤵
        PID:3472

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        194KB

        MD5

        6673aa915e167fe63f48058d46ca7700

        SHA1

        78ace7f8dcfd7dbfd770c9f5ecb80ec2c7b3286a

        SHA256

        a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f

        SHA512

        2676f040cf7867e4f0cd42e9547a68fcc04aaa3dedd7623b99585a77fa94e45e2465a6640f788f2ba1ac5aac0275281794ae8b9c4ac26a04c493686baeb61cac

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        194KB

        MD5

        6673aa915e167fe63f48058d46ca7700

        SHA1

        78ace7f8dcfd7dbfd770c9f5ecb80ec2c7b3286a

        SHA256

        a1193aa90084ed1bbc88de8ed4d44c35a0727520e77f79ebd575ea2875826e6f

        SHA512

        2676f040cf7867e4f0cd42e9547a68fcc04aaa3dedd7623b99585a77fa94e45e2465a6640f788f2ba1ac5aac0275281794ae8b9c4ac26a04c493686baeb61cac

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D83BA541-41EC-11ED-89AC-F639923F7CA1}.dat

        Filesize

        5KB

        MD5

        e7264cfcb960665a207ad95a827f07fe

        SHA1

        ca4f89346623ee8848947fce047554d7d3a30864

        SHA256

        28154c93d58fa6ea0cfc89b43a33e25f05d3b41a6e5a417fddda0b839efceec7

        SHA512

        c5706020e8f8a788863166f4c3474206973f8eb0fbc30fff3263d68bb97d7de057aee88e8c0fdd2c3c75b2b235dc345bac8f677a421ab1c42f615d2d7126485f

      • memory/728-134-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/728-135-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/728-139-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4840-147-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-146-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-148-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-149-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-151-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-152-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-153-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4840-154-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB