Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 19:21

General

  • Target

    836c224d6b720e175554029d5465b13d207904b71974f9dcdfbe69f2e2de914e.exe

  • Size

    64KB

  • MD5

    83e81ad36d22123133e5dbe8654c1cd9

  • SHA1

    207508a48bf0e18311a798ba106574282c9eaa39

  • SHA256

    836c224d6b720e175554029d5465b13d207904b71974f9dcdfbe69f2e2de914e

  • SHA512

    1ad0bb40c0b90796a99aa22333207038ce91b45d2fbd200a2c73091864c3c7f20db4252342477acf96ef05220c362e385c27b7657aa43cb482b713c175d10b65

  • SSDEEP

    1536:w4xDXwnrh23xVpS04Ti7qXE3dHi7YVwbC:w6Lwrh23Dpt93dHiEVwO

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 16 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\836c224d6b720e175554029d5465b13d207904b71974f9dcdfbe69f2e2de914e.exe
    "C:\Users\Admin\AppData\Local\Temp\836c224d6b720e175554029d5465b13d207904b71974f9dcdfbe69f2e2de914e.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Windows directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del.bat
      2⤵
        PID:3984
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3986855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:684

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\del.bat

            Filesize

            114B

            MD5

            b5aefafd5ee80d824546c6ec94a1e131

            SHA1

            a2fca0ee5c68c4e17c60d9d0f6f7b053cf659982

            SHA256

            ef12d9b374ecda0a203cd447b410bc801d0b50a7c0a335706204054b2d385ba6

            SHA512

            d926bc9249099664e55936df6b9d410e7a15655db501ce4abc842f7863cf97702b2b131719b7d78164dfa0001711375526d55cf206cfbc8eed9963f36f830273

          • memory/4316-132-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4316-137-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB