Analysis

  • max time kernel
    152s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 22:50

General

  • Target

    57b4b1c5432d04690b378a4c403297975b4e9b18c1e02a213db8de3043c673d9.exe

  • Size

    190KB

  • MD5

    922203f3f8e732b254c9ab9dc5fe33c5

  • SHA1

    d85095ccf6e73b22bf86330b45db6768dbd3ca0a

  • SHA256

    57b4b1c5432d04690b378a4c403297975b4e9b18c1e02a213db8de3043c673d9

  • SHA512

    2a9bf9f91c56b546eb7ff0b165a985b7a0b54f34a6366de4de56245b590493cc5ff394e2fed68a6ef7eb3ff8a3e2993563f6f62b7fe35b49e753dc737ee60ab8

  • SSDEEP

    3072:VRc6IhwbzWWt4eKes4x1E8OkGt82gmUu4y670WAgDpfU+:VRcabzRWLL4DvG4uD670YM+

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57b4b1c5432d04690b378a4c403297975b4e9b18c1e02a213db8de3043c673d9.exe
    "C:\Users\Admin\AppData\Local\Temp\57b4b1c5432d04690b378a4c403297975b4e9b18c1e02a213db8de3043c673d9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4928

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4928-132-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4928-133-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4928-134-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/4928-135-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB