Analysis

  • max time kernel
    150s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 14:10

General

  • Target

    57cc01d0254794b84e64f9047bdbb04e96cdffbd362dab0f0982280f3b1cd131.exe

  • Size

    793KB

  • MD5

    968a81d0b9741b391ab0e3214443c4f0

  • SHA1

    243ed0425fb61ce1b1353c20db30e7899d459b05

  • SHA256

    57cc01d0254794b84e64f9047bdbb04e96cdffbd362dab0f0982280f3b1cd131

  • SHA512

    b258ca5d645a53ef583e5b1c3a21fdc8d6294b57d7cd93c6958a3f0bf49ce7d8d448c497cbe1e5c51f4cc96f2a9c44d6ea8b62a8b80470f8df1a1e2a1362c19f

  • SSDEEP

    24576:9whQR/xu+dhLxGRPNq1jQl1wo0/W3Wc6q3:9wuHPGJNwjQjwf/43

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57cc01d0254794b84e64f9047bdbb04e96cdffbd362dab0f0982280f3b1cd131.exe
    "C:\Users\Admin\AppData\Local\Temp\57cc01d0254794b84e64f9047bdbb04e96cdffbd362dab0f0982280f3b1cd131.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:632

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/632-132-0x00000000025C0000-0x0000000002743000-memory.dmp

          Filesize

          1.5MB

        • memory/632-139-0x00000000025C0000-0x0000000002743000-memory.dmp

          Filesize

          1.5MB

        • memory/632-140-0x00000000025C0000-0x0000000002743000-memory.dmp

          Filesize

          1.5MB

        • memory/632-141-0x00000000025C0000-0x0000000002743000-memory.dmp

          Filesize

          1.5MB