Analysis

  • max time kernel
    179s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 05:18

General

  • Target

    fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe

  • Size

    218KB

  • MD5

    5a366d62530247bbb7fe6460fc748da0

  • SHA1

    c430642e000fbff14d0e05209085a473d33aaf1f

  • SHA256

    fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c

  • SHA512

    dd08b8d160aecfc2f6937475e058b29b4ab70cf0f5d9ecde56d4dddd297fac8437f5943a7c10f4bbb5ee349911d038003526429aabd3fc04f344969d02645c67

  • SSDEEP

    6144:2TMpSoR/PJ+Ol8uTCnDnxdj24lSZACZK:2WSoR/PJ+OlvqDxR24lSZAd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe
    "C:\Users\Admin\AppData\Local\Temp\fccf98555ca5f1c110163b2d07db2ecf86207b42551e3d31938ebd4e6ec5621c.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\ProgramData\Microsoft\CDRM\tsasys.exe
      C:\ProgramData\Microsoft\CDRM\tsasys.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\CDRM\tsasys.exe

    Filesize

    218KB

    MD5

    17f25933170a7646ee020e9c16cb3acf

    SHA1

    43d5a9cdf2f1324df608ad9fe4185a6e38a7bfce

    SHA256

    8086e8a1d2fd1ef8cd486c1d4732778d262934c8143f03fe269b5d53a6c37dea

    SHA512

    2b4d5a5ce89b984602831ad9b17675561da3fcbdf9e4faeb322962b772b3511d3e5f354c9598a1ae0ce4a8edfa0081b507b39fe0de965a080e089f708ba1a8ff

  • C:\ProgramData\Microsoft\CDRM\tsasys.exe

    Filesize

    218KB

    MD5

    17f25933170a7646ee020e9c16cb3acf

    SHA1

    43d5a9cdf2f1324df608ad9fe4185a6e38a7bfce

    SHA256

    8086e8a1d2fd1ef8cd486c1d4732778d262934c8143f03fe269b5d53a6c37dea

    SHA512

    2b4d5a5ce89b984602831ad9b17675561da3fcbdf9e4faeb322962b772b3511d3e5f354c9598a1ae0ce4a8edfa0081b507b39fe0de965a080e089f708ba1a8ff

  • memory/532-132-0x0000000000000000-mapping.dmp

  • memory/532-135-0x0000000073840000-0x0000000073879000-memory.dmp

    Filesize

    228KB