Analysis

  • max time kernel
    133s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 22:31

General

  • Target

    7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8.exe

  • Size

    127KB

  • MD5

    90e2869b6358f10a54b9f605330bb080

  • SHA1

    c9e5645ade83c25078af054e6a40bab3f305c1a1

  • SHA256

    7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8

  • SHA512

    c2d6db052c53e4421ee388c2d3d29a34287378a874f9efed442006b745956a48d4b9938c00b1228da810b9ed017b88f9365a3276a135c6521911980514550f92

  • SSDEEP

    3072:xhaXpckpdyFV9RzPH3UPDVOGE9Bn6AtU7HHwrqdmbOQfJhNK2ktNc:xhaXmmgFV9abEn6AUkiQG2o2

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8.exe
    "C:\Users\Admin\AppData\Local\Temp\7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2512
    • C:\Users\Admin\AppData\Local\Temp\7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8.exe
      "C:\Users\Admin\AppData\Local\Temp\7733b3bc9b01649aa7ff709b2787b6919a05c0123fceb13e05acc0e2119461c8.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:776
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:776 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3536
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
    1⤵
      PID:3660

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      d3ff0edeee7d1ea5754d8a290ae01189

      SHA1

      253ee24a4776d30bac0aedd7ea213adea6acb6f9

      SHA256

      e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b

      SHA512

      ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      967bb052bf23f213d5c7dbed4867c5e0

      SHA1

      8045cb8b84d8fc58307b60baa6c01592aa3ab02e

      SHA256

      5cd67939b428e375a80930364255b45fc8a64080ede01140a744d241e8bf5951

      SHA512

      d67c93b69a6c8bb17d7f0d5a2cdfb1a6c5e1aecad82935d25760c1eb832d89d5cd94d4942849bff664449a387b431e7f983b5ca10c5c419a35d7e09839b683b0

    • memory/1128-139-0x00000000006D0000-0x00000000006E4000-memory.dmp

      Filesize

      80KB

    • memory/1128-132-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/1128-138-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/1464-142-0x0000000000710000-0x0000000000731000-memory.dmp

      Filesize

      132KB

    • memory/5084-136-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/5084-143-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/5084-144-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB

    • memory/5084-140-0x0000000000400000-0x000000000044E000-memory.dmp

      Filesize

      312KB