Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe
Resource
win10v2004-20221111-en
General
-
Target
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe
-
Size
2.1MB
-
MD5
3a953fff32e8c817593a6a5dfdbc233d
-
SHA1
616d350bd5ee19630b364822da7cfce711f0cb52
-
SHA256
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d
-
SHA512
60cd2df44f6b9e87304d69e1579cebd5606f69cd5768a5718fd60f53a7e3c111dc0963b2c7e07a1eb6fc45224a172d63b060874dbaaecc9458b7933de5ee36e8
-
SSDEEP
49152:9I7F1k/0hXab2VZI9S7qbrtLeB36SS47/hDu5u87hx6:QBu2EWq/t05rZy7hx6
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exepid process 5060 f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe 5060 f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exedescription pid process Token: 33 5060 f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe Token: SeIncBasePriorityPrivilege 5060 f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exepid process 5060 f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe"C:\Users\Admin\AppData\Local\Temp\f4f9cfebc3f1f68895f22793ce8c5564352941b0f59c7a7551cccec34274ca3d.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5060
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD517a340b825f9917f3dd775661cd2b253
SHA17b55f2c7d08a055e792cc1f0784d184e398f85de
SHA2569816e11afd75f15fa080c2db822e810e01241a5bb1fd505e5a7982c33d680027
SHA5127794aa274ffa8740255989ccf80ea61cefa182fdc501e7ba6a3c15bce5c54111e4eb0cd6cf7b2c0abaa17526fb8e78daa30bb53cb65e9d3a589b0c628c600fd5
-
Filesize
2KB
MD5d122b19933a1512904520bedbb5f58d7
SHA114e85e2b7bdc1eafd50dd5cc604c06fe0de9e510
SHA2563ed5f9e82910d2b08b19956653c4197e12b56e99faef80693cd60b2755939204
SHA512e76e711930d46940734e605432bc9b6a4086bcf150c82ed7f81e4388dd4f0b2dda44e99aa2acda33a093bd13766ad4495a0aad2aa02bc742023493c155569bea