Analysis

  • max time kernel
    119s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 03:44

General

  • Target

    93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade.exe

  • Size

    218KB

  • MD5

    66682a0706b9f24cc775ac7df291dc20

  • SHA1

    5ac8d3952a71e9c7c27a9d5978bb83a4848f474e

  • SHA256

    93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade

  • SHA512

    b6f5acb0c53ecd5a3db5226e8e2702b5d3e22432c21b2d523b815557f70b7cde6d4b55a6dc9f49c712b5e8f231ae164984e9a0711a5f21bc0dfc3e4295b43486

  • SSDEEP

    3072:vOdsKS+RzTqFN0eGrKiD1kCczflHdkR2K9Y:DlGrKiD0jnRd

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade.exe
    "C:\Users\Admin\AppData\Local\Temp\93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Local\Temp\93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade.exe
      "C:\Users\Admin\AppData\Local\Temp\93bc2f93fa1e8c5283849a802468c3ae7172ffa1c17e892159c171d6bc5dfade.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3088

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          fceed7a5f76725fb398c6a91ff552899

          SHA1

          237aec000ae7c7c35a639664b1ad6c0d842a0749

          SHA256

          2888c66a6908f10474313b2fef31aeeff40cffe1bcbd19b84b29334ff6a71383

          SHA512

          adfba4e72523d38395c13122d6498d9b48d93b2967858f0208549e3830c9b47ee3e98249b98fe585aeeeffe491a6985a98c80a3be581abccf4239bad4d1cdef3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          d40a09be94db8d645eda3998ff10988a

          SHA1

          80b7c4c8ee78db060d628c5540ba09a6cee43f20

          SHA256

          937f0530604644112ea7737252da0b62fee363df3f15a72e7b7e605bff035a56

          SHA512

          1efcee9e31f34f921685968a33b6eb8ecd440ccebb30a5a3d4b27af6eaaa38430ac57102ee02e845a786f09ec3baa6db1cc134fc13efa003dfe35eaeb1946b41

        • memory/1388-136-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1388-139-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1388-140-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1388-141-0x0000000002700000-0x000000000274E000-memory.dmp

          Filesize

          312KB

        • memory/1388-142-0x0000000000400000-0x000000000044E000-memory.dmp

          Filesize

          312KB

        • memory/1388-143-0x0000000002700000-0x000000000274E000-memory.dmp

          Filesize

          312KB

        • memory/3856-132-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3856-138-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB