Analysis
-
max time kernel
193s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
603KB
-
MD5
cb90f4dd9eb3424268b20a1581668acd
-
SHA1
136a226e0f56c7bf53822ab116ea4304b8a636e6
-
SHA256
49d6552ae5c5027ce1e68edee2438564b50ddc384276fd97360c92503771d3ac
-
SHA512
43ef96a52dfe7018d7fd9315c428fb1b368e92357585f57bd405260d5e5d9f498e423d0a3d5de1ef300983f3f7b42bd7a2f2217ca5d74b88c4533021086c19a4
-
SSDEEP
3072:QahKyd2n3165+HAsZsJBh6aH1wQwpSbr:QahOpqhvSn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5004 STOREM~2.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5004 STOREM~2.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4856 wrote to memory of 5004 4856 file.exe 80 PID 4856 wrote to memory of 5004 4856 file.exe 80 PID 4856 wrote to memory of 5004 4856 file.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXE2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed