Analysis

  • max time kernel
    152s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 18:16

General

  • Target

    2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca.exe

  • Size

    200KB

  • MD5

    0cd7fa562353d6a5c30d3a3fcc459337

  • SHA1

    c1085fc0b00b04e5f0aeef7e76609e63ad6685bc

  • SHA256

    2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca

  • SHA512

    196eb2275783066a97bfe6daec8028a0b84f804e83a3a2f656a8f1e1f2a884a71be0f639dd96e72c03adc3dc2ec9c4063defe12b19372f0b022eae0097ab240b

  • SSDEEP

    3072:XlZ7bXfqPSbvsHudBEFxrec46CyB03CnPGCOMriY6iyEIsUyvEreq:o4vsOQFxreJS0KtOeiXiylsUyvEr

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca.exe
    "C:\Users\Admin\AppData\Local\Temp\2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2484
    • C:\Users\Admin\AppData\Local\Temp\2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca.exe
      "C:\Users\Admin\AppData\Local\Temp\2a3fb070164e37a5f10f49f01107b9bd69824b4e355ae11f5eedf9f21b0a33ca.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4196
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4236 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/796-134-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/796-144-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2484-136-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2484-140-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2484-141-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2484-149-0x0000000002940000-0x000000000298E000-memory.dmp

    Filesize

    312KB

  • memory/4196-139-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4196-145-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4196-147-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4196-148-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB