Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 15:03

General

  • Target

    df7d480a19c017a54562284c95f49b4f2b23fb30578cc12b4a12eeb54b28e8c5.exe

  • Size

    226KB

  • MD5

    6ebbaa20ea5b959b43ea3fe5c457933f

  • SHA1

    05ad68b175c1a7e9afe21af53daddda5bd7d8b6c

  • SHA256

    df7d480a19c017a54562284c95f49b4f2b23fb30578cc12b4a12eeb54b28e8c5

  • SHA512

    a179d662ccc1eac23ff0590ef65bb546e299dee6efff83daaecca9c476c899aff65e3ac5911e05f3140a3601b9326a0193c3c769da00ce28116bf535a84ddc10

  • SSDEEP

    6144:aFtDCIAtqHbPxhlV1PUF3HPFY2iEUS6kegd/:uteD0HbphlV1PmPFY2iEUSvjd/

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df7d480a19c017a54562284c95f49b4f2b23fb30578cc12b4a12eeb54b28e8c5.exe
    "C:\Users\Admin\AppData\Local\Temp\df7d480a19c017a54562284c95f49b4f2b23fb30578cc12b4a12eeb54b28e8c5.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies WinLogon
    • Suspicious use of AdjustPrivilegeToken
    PID:2100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2100-132-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB

  • memory/2100-133-0x00000000022B0000-0x0000000002302000-memory.dmp

    Filesize

    328KB

  • memory/2100-134-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB

  • memory/2100-135-0x00000000022B0000-0x0000000002302000-memory.dmp

    Filesize

    328KB

  • memory/2100-136-0x00000000023B0000-0x0000000002458000-memory.dmp

    Filesize

    672KB

  • memory/2100-137-0x0000000000400000-0x0000000000567000-memory.dmp

    Filesize

    1.4MB

  • memory/2100-138-0x0000000002980000-0x0000000002A38000-memory.dmp

    Filesize

    736KB