Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 10:23

General

  • Target

    ab5e50dd43b3b53d0d874194be68648e0a97aeb5ac154578a4b33dc048bfaea4.exe

  • Size

    786KB

  • MD5

    40356d1c956ea718a1f69d42e43a04f0

  • SHA1

    33866868f69916b64c7aa86dd7be87e8c54e5c58

  • SHA256

    ab5e50dd43b3b53d0d874194be68648e0a97aeb5ac154578a4b33dc048bfaea4

  • SHA512

    29dcbfbc004339b4ab2ac3a88fdadf0170705576b4c3c91931cd1f3724967fa54a69a49dbd1139c93c359830f8ece90962e8b9cb83e3a0968ac232294d89746b

  • SSDEEP

    24576:N7xW09uXqct8Kf68W6dDvX94m+k7qZ87UhJB7clI1:N7xW0vJKCF8DFb7lqJa21

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab5e50dd43b3b53d0d874194be68648e0a97aeb5ac154578a4b33dc048bfaea4.exe
    "C:\Users\Admin\AppData\Local\Temp\ab5e50dd43b3b53d0d874194be68648e0a97aeb5ac154578a4b33dc048bfaea4.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4884

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4884-132-0x00000000031A0000-0x0000000003323000-memory.dmp

    Filesize

    1.5MB

  • memory/4884-139-0x00000000031A0000-0x0000000003323000-memory.dmp

    Filesize

    1.5MB

  • memory/4884-140-0x00000000031A0000-0x0000000003323000-memory.dmp

    Filesize

    1.5MB

  • memory/4884-141-0x00000000031A0000-0x0000000003323000-memory.dmp

    Filesize

    1.5MB