Analysis
-
max time kernel
123s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2022 09:16
Static task
static1
Behavioral task
behavioral1
Sample
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe
Resource
win10v2004-20220812-en
General
-
Target
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe
-
Size
855KB
-
MD5
6aa1e096f657f2d549e67579d7edb490
-
SHA1
fe36a9211ef9b8c35697c97addccc94a47223d7c
-
SHA256
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250
-
SHA512
746c7ecce12b54aad4a0de9265690a2e860e4a87fddd1a6200f926d857b09cc9ec36da8be2252b0b9802078cab50db1bf6fd6cc1228851a917cfe159ad986ebc
-
SSDEEP
3072:15oQcAV8NrucfhvH8GLx99NhCHBd0vqV7S1zWnyzYmLZds2qHhHTYYzy6aWeTaAF:1uW
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exedescription pid process target process PID 1380 set thread context of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 set thread context of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exepid process 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exedescription pid process Token: SeDebugPrivilege 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe Token: SeDebugPrivilege 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exedescription pid process target process PID 1380 wrote to memory of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 1380 wrote to memory of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 1380 wrote to memory of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 1380 wrote to memory of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 1380 wrote to memory of 4644 1380 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 wrote to memory of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 wrote to memory of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 wrote to memory of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 wrote to memory of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 4644 wrote to memory of 2992 4644 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 2992 wrote to memory of 1916 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 2992 wrote to memory of 1916 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe PID 2992 wrote to memory of 1916 2992 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe 48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe"C:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exeC:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exeC:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exeC:\Users\Admin\AppData\Local\Temp\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe4⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\48a8eafd9013ef1d61ce5b61601828f97c602531d9f7621af9bcbd4fffc72250.exe.logFilesize
418B
MD598eea38457c9976c0ec48b5a70964041
SHA1281ec6ada096be89ade13852ca86edfe42ffe3c1
SHA2564a7455429d6f3c7390f97bc406d0bcc7d64ddff6bee5ffa9e88c5a75f806bfcf
SHA512adb7bb4e1434d743932890aede4daa55c6e9f091415292775313dd172949fbd415f124c97e017a8204aab530b6184f196ab5cce005781b0853ffccc620f07530
-
memory/1380-132-0x0000000000AF0000-0x0000000000BCC000-memory.dmpFilesize
880KB
-
memory/1380-133-0x0000000005B00000-0x00000000060A4000-memory.dmpFilesize
5.6MB
-
memory/1380-134-0x00000000055F0000-0x0000000005682000-memory.dmpFilesize
584KB
-
memory/1380-135-0x0000000005580000-0x000000000558A000-memory.dmpFilesize
40KB
-
memory/1380-136-0x0000000007750000-0x00000000077EC000-memory.dmpFilesize
624KB
-
memory/1916-142-0x0000000000000000-mapping.dmp
-
memory/2992-140-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2992-139-0x0000000000000000-mapping.dmp
-
memory/4644-137-0x0000000000000000-mapping.dmp
-
memory/4644-138-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB