Analysis

  • max time kernel
    59s
  • max time network
    88s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 09:16

Errors

Reason
Machine shutdown

General

  • Target

    35377622d50d73636297a1b378ffb0d3c8662dec555a4b11963d91678f6673da.exe

  • Size

    79KB

  • MD5

    301f18525f0550851175c9b30c6afa20

  • SHA1

    900bb0bcd4d06a96c26f058473944347d4675bcd

  • SHA256

    35377622d50d73636297a1b378ffb0d3c8662dec555a4b11963d91678f6673da

  • SHA512

    c858f7b3470526d7302c28f5cde1ed84580d99be7328683324c89bd222620ae319a50a1f60129106f585282413b132293d2286b0abb9e8903168b97b2af0eedb

  • SSDEEP

    1536:OwrBa5B/ltw6brmYIienIymdXVkE1akenxUlPOjhAoHJlIK:nw5VI63IRbmdXV7venKPQAoHJlIK

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35377622d50d73636297a1b378ffb0d3c8662dec555a4b11963d91678f6673da.exe
    "C:\Users\Admin\AppData\Local\Temp\35377622d50d73636297a1b378ffb0d3c8662dec555a4b11963d91678f6673da.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:620
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39d4855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/620-132-0x0000000001000000-0x0000000001016000-memory.dmp

    Filesize

    88KB

  • memory/620-133-0x0000000001000000-0x0000000001016000-memory.dmp

    Filesize

    88KB