Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 06:02

General

  • Target

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe

  • Size

    85KB

  • MD5

    936b3450aad167eab25b9dc9f80a0b44

  • SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

  • SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

  • SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • SSDEEP

    1536:8PFYgIzz2OQdfgB3KEkWAfN8pO2D1hjuWOmeVXQVVzL:/ZzIQZk9fN8RjurfgV9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe
      "C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe
        "C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe
          "C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"
          4⤵
          • Executes dropped EXE
          PID:1364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • memory/848-138-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/848-134-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1364-155-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1364-154-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1364-152-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4500-146-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4500-136-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4500-140-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4500-139-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4776-147-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/4776-153-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB