Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 09:03

General

  • Target

    ab832cf8baee1daf9877338e27528cbb69edcfb8de501ce63d6926f60ec0b01e.exe

  • Size

    813KB

  • MD5

    0dab5c94f4f559f2a61ed8fe8ad1b3c4

  • SHA1

    ee9a5247b3ded9e6f4e49664c203b5defbc87524

  • SHA256

    ab832cf8baee1daf9877338e27528cbb69edcfb8de501ce63d6926f60ec0b01e

  • SHA512

    da0a9a686a4f17d2f9a8c50aa9e8cb34d61ccda9c43d57794db7327389dd9f63a33ac82e3fb392a90284136eba7230d263481a6ac2636e6c07cd970791a63c3b

  • SSDEEP

    24576:tC59jpritb2KdFoyoAo381TYZg1Yb3/5A:c5utJonseZ3LhA

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab832cf8baee1daf9877338e27528cbb69edcfb8de501ce63d6926f60ec0b01e.exe
    "C:\Users\Admin\AppData\Local\Temp\ab832cf8baee1daf9877338e27528cbb69edcfb8de501ce63d6926f60ec0b01e.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4972-132-0x0000000002C60000-0x0000000002DE0000-memory.dmp

    Filesize

    1.5MB

  • memory/4972-139-0x0000000002C60000-0x0000000002DE0000-memory.dmp

    Filesize

    1.5MB

  • memory/4972-140-0x0000000002C60000-0x0000000002DE0000-memory.dmp

    Filesize

    1.5MB

  • memory/4972-141-0x0000000002C60000-0x0000000002DE0000-memory.dmp

    Filesize

    1.5MB