Analysis

  • max time kernel
    37s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 20:24

General

  • Target

    f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe

  • Size

    13KB

  • MD5

    839d32c31039160a912fcfbb3def6850

  • SHA1

    3f7a0f47f79056946e9931f3966d0f436fcfc6cf

  • SHA256

    f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea

  • SHA512

    40c3be7ab2c216343db60df40275780a39c1ef51cc109ac0949e422324ec7db9729003cd27766a4f695380e857952d2541e537259532760c4512ec33c6a3bec2

  • SSDEEP

    384:8lw3tHjlsEgYwZqUrRE0e22AE6GmbMqiGAg:u6R9LwZle0n2ADbA

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Disables taskbar notifications via registry modification
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe
    "C:\Users\Admin\AppData\Local\Temp\f05bfcd89931b07619ce3cce8bf79cabd1ccf69d1d6f61aa1ad97ddaa1d772ea.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\SysWOW64\msiexec.exe
      2⤵
      • UAC bypass
      • Adds policy Run key to start application
      • Blocklisted process makes network request
      • Deletes itself
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/868-59-0x0000000000B40000-0x0000000000B54000-memory.dmp

          Filesize

          80KB

        • memory/868-60-0x000000007EF90000-0x000000007EF95000-memory.dmp

          Filesize

          20KB

        • memory/868-61-0x000000007EF90000-0x000000007EF95000-memory.dmp

          Filesize

          20KB

        • memory/868-62-0x000000007EF90000-0x000000007EF95000-memory.dmp

          Filesize

          20KB

        • memory/968-54-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB

        • memory/968-55-0x0000000076091000-0x0000000076093000-memory.dmp

          Filesize

          8KB

        • memory/968-56-0x000000007EF90000-0x000000007EF95000-memory.dmp

          Filesize

          20KB