Analysis

  • max time kernel
    90s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 15:06

General

  • Target

    a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b.exe

  • Size

    90KB

  • MD5

    8350a629f0e1823e5cb1df3f76f1e520

  • SHA1

    860f4e6fba034f5721f1280031dff25960a421c6

  • SHA256

    a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b

  • SHA512

    fc041f82c60580d63eea462c6a8509c8e34b174272fd954f13f3f391f38fa1571585cbff7ec9b7e7f9aea17a5d572c21596cc0cef3ecb7b812c3123c47c48a9f

  • SSDEEP

    1536:dN5XSmrrVu6km3xmD/qABHWvnGkOXg6Kk2+UJWN/9pAFvQhoKPKDv/7bcv6pan71:dNwuo6km3WqNOlKk0J4l2FgonT/7Kf71

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b.exe
    "C:\Users\Admin\AppData\Local\Temp\a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b.exe
      C:\Users\Admin\AppData\Local\Temp\a774103df31902774e15f2d2f3f7f15096d47506b1115a5b3feedacaef593e1b.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 812
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:2184

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/816-136-0x00000000754F0000-0x0000000075AA1000-memory.dmp

          Filesize

          5.7MB

        • memory/5036-133-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/5036-135-0x00000000754F0000-0x0000000075AA1000-memory.dmp

          Filesize

          5.7MB

        • memory/5036-137-0x00000000754F0000-0x0000000075AA1000-memory.dmp

          Filesize

          5.7MB