Resubmissions

21-10-2022 03:52

221021-efgnrsahf4 5

21-10-2022 03:41

221021-d8rh1aaebq 5

Analysis

  • max time kernel
    114s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 03:52

General

  • Target

    1d18b0282035bf5d338d9d3b292d8e224dd9a11209e9f1ec5aadc39f1d842302.exe

  • Size

    5.6MB

  • MD5

    ee6cb7d44b65b0817f1bbb9e958d1873

  • SHA1

    60d492526190e731344e2de56045b728fa601954

  • SHA256

    1d18b0282035bf5d338d9d3b292d8e224dd9a11209e9f1ec5aadc39f1d842302

  • SHA512

    f93ceaea44523d724d4b0f6d4dc2cf005699a7ba1a070726e6a8f791294c8b6b2350603d885d22139a06be70c5389e84c978cae35938a21807dddf33ec182cf1

  • SSDEEP

    49152:Ccp0EB9au/0qat+eS2c9GOrGGGGGRC7lUcfwzcsnI7:Bp0yaNqNN2cGOrGGGGGRGlUcfk

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d18b0282035bf5d338d9d3b292d8e224dd9a11209e9f1ec5aadc39f1d842302.exe
    "C:\Users\Admin\AppData\Local\Temp\1d18b0282035bf5d338d9d3b292d8e224dd9a11209e9f1ec5aadc39f1d842302.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:4192
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:4524
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
            PID:3452

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2236-132-0x00000000008A0000-0x0000000000E3C000-memory.dmp

          Filesize

          5.6MB

        • memory/2236-133-0x00007FF963AE0000-0x00007FF9645A1000-memory.dmp

          Filesize

          10.8MB

        • memory/2236-138-0x00007FF963AE0000-0x00007FF9645A1000-memory.dmp

          Filesize

          10.8MB

        • memory/3452-134-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3452-137-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/3452-139-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB