Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 02:36

General

  • Target

    08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48.exe

  • Size

    232KB

  • MD5

    5bb5f129ce3fc8893dd7dd6a17a4f2c0

  • SHA1

    1f4ab9aeea449fceb93d8ce0059c2868dc20cc29

  • SHA256

    08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48

  • SHA512

    2040d477b4686afdc1551ab4c3dbeec3a58548a713afc4c26e50663f1e042b1e659175a019b734219d69b2194c8c9c487694de347757f9cf66e294d56efaf24f

  • SSDEEP

    6144:01VDCiamd0vcjCHCGfGO3xiku+Pjvx/cp:6VKs0vc2iGP3i+7+

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48.exe
    "C:\Users\Admin\AppData\Local\Temp\08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48.exe
      C:\Users\Admin\AppData\Local\Temp\08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48.exe
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\syswow64\explorer.exe"
        3⤵
        • Drops startup file
        • Adds Run key to start application
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\SysWOW64\svchost.exe
          -k netsvcs
          4⤵
            PID:4540

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1280-138-0x0000000000DA0000-0x0000000000DC5000-memory.dmp

            Filesize

            148KB

          • memory/3292-133-0x0000000000400000-0x0000000001400000-memory.dmp

            Filesize

            16.0MB

          • memory/3292-135-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/3292-137-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/3408-134-0x00000000027C0000-0x00000000027C4000-memory.dmp

            Filesize

            16KB

          • memory/4540-140-0x0000000000540000-0x0000000000565000-memory.dmp

            Filesize

            148KB