Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 01:40

General

  • Target

    d12899e68fd739a9c944c034a98b90e99c7dc89143093e8600a8c6d4778ce798.exe

  • Size

    216KB

  • MD5

    0f2e4b155f2857a80dc325b7a7b79f61

  • SHA1

    d566035c49966bf4344bd1cd54eb6a52f5b83aed

  • SHA256

    d12899e68fd739a9c944c034a98b90e99c7dc89143093e8600a8c6d4778ce798

  • SHA512

    07e50d190dc2a8e429ee7ec34260502322882ac0565a453662b724a394cfd71234cba59aaac5874d66e724af02ce5b66535413f8b372e617c97a2614c06f6657

  • SSDEEP

    6144:YItxogSWgawEHyuKRo560rNqQWe8m1LQd7LG6XOKsW:YItxlPhQNRo53r0S1LOXOKT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\d12899e68fd739a9c944c034a98b90e99c7dc89143093e8600a8c6d4778ce798.exe
        "C:\Users\Admin\AppData\Local\Temp\d12899e68fd739a9c944c034a98b90e99c7dc89143093e8600a8c6d4778ce798.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\jthhjaw.exe
          C:\Windows\jthhjaw.exe a
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1048
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
          • Deletes itself
          PID:2028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\jthhjaw.exe

      Filesize

      216KB

      MD5

      d879c724ab936a285db88909723a5102

      SHA1

      1996b3fc8e5f8bad1ff3584e868404f13014b6da

      SHA256

      bd61ec182bd7fb9f4a6bac1e9688c7625d12b36ff3cad74cde6acbdc8b419ecb

      SHA512

      4a0fd08adf20141349b65d1fee449a82ebb050759fa8a0fe73af975e360016fff409267aad9b525e8e479c5aa08f7ff3afb7afb54dbff81420d1d3ec89f98f82

    • memory/1048-62-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/1348-56-0x0000000002620000-0x0000000002659000-memory.dmp

      Filesize

      228KB

    • memory/2012-59-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2028-60-0x0000000074B51000-0x0000000074B53000-memory.dmp

      Filesize

      8KB

    • memory/2028-61-0x00000000746C1000-0x00000000746C3000-memory.dmp

      Filesize

      8KB