Analysis

  • max time kernel
    149s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 22:06

General

  • Target

    f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478.exe

  • Size

    216KB

  • MD5

    7ae277ad33f1eda32a8c934615f9ae57

  • SHA1

    8e1fe6f543a3e6fd66477c3aa0dbe9a230ef8f85

  • SHA256

    f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478

  • SHA512

    45c6d5e2e2ee4e529e2f6362931a555206f11e32c3a4d30d2900f25365ee5cef3410f0b83d48e9c1fe05a1d1fb33cc50bf40784918073b7378123f76cca3e147

  • SSDEEP

    3072:L7jVeHLXsnENPCcRDUN3PBneGHB/ThdFJpS5W7FQaum4GeMBpbVVDQ:2LXsnuKeoBXBbfF3V7GD8/b8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478.exe
    "C:\Users\Admin\AppData\Local\Temp\f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478.exe
      "C:\Users\Admin\AppData\Local\Temp\f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Roaming\Jsegzrrtapjsaoxe.exe
        -n
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Roaming\Jsegzrrtapjsaoxe.exe
          -n
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~54812.tmp

    Filesize

    216KB

    MD5

    7ae277ad33f1eda32a8c934615f9ae57

    SHA1

    8e1fe6f543a3e6fd66477c3aa0dbe9a230ef8f85

    SHA256

    f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478

    SHA512

    45c6d5e2e2ee4e529e2f6362931a555206f11e32c3a4d30d2900f25365ee5cef3410f0b83d48e9c1fe05a1d1fb33cc50bf40784918073b7378123f76cca3e147

  • C:\Users\Admin\AppData\Roaming\Jsegzrrtapjsaoxe.exe

    Filesize

    216KB

    MD5

    7ae277ad33f1eda32a8c934615f9ae57

    SHA1

    8e1fe6f543a3e6fd66477c3aa0dbe9a230ef8f85

    SHA256

    f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478

    SHA512

    45c6d5e2e2ee4e529e2f6362931a555206f11e32c3a4d30d2900f25365ee5cef3410f0b83d48e9c1fe05a1d1fb33cc50bf40784918073b7378123f76cca3e147

  • C:\Users\Admin\AppData\Roaming\Jsegzrrtapjsaoxe.exe

    Filesize

    216KB

    MD5

    7ae277ad33f1eda32a8c934615f9ae57

    SHA1

    8e1fe6f543a3e6fd66477c3aa0dbe9a230ef8f85

    SHA256

    f1a4df9568feadb23b63c862bc9bb8a779d1b15a81ef9938aeb383e6a0f47478

    SHA512

    45c6d5e2e2ee4e529e2f6362931a555206f11e32c3a4d30d2900f25365ee5cef3410f0b83d48e9c1fe05a1d1fb33cc50bf40784918073b7378123f76cca3e147

  • memory/3524-139-0x0000000000000000-mapping.dmp

  • memory/3524-145-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4276-132-0x0000000000000000-mapping.dmp

  • memory/4276-133-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4276-135-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4276-138-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4840-136-0x0000000000000000-mapping.dmp