Analysis

  • max time kernel
    147s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:01

General

  • Target

    d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe

  • Size

    200KB

  • MD5

    917928febb4a1c1cac116fa4bc019ce6

  • SHA1

    a3b239577938b82b16a27a203e7ee85db4eb0389

  • SHA256

    d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f

  • SHA512

    ddcaa1dc23321381d9d918359359a3ec2458f1733fad9515fdad1b4e4d4f0d3cd9e34b55c844c4eee7062c725378e63649deb6066c2b34fa82e9d90e8be08bc3

  • SSDEEP

    3072:L2q25gnnh5WaadWiSrd8H2ckFXjcb0a+UqDp7xhDnCQ6scVpE0aD/JGwBQl19GSu:Lz25gnnh5LadmjcbAUAp7xhDnM/qDibu

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
    "C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
      "C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        3⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\SysWOW64\notepad.exe"
          4⤵
          • Adds Run key to start application
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:4152
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\SysWOW64\calc.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4244
      • C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe
        "C:\Users\Admin\AppData\Local\Temp\d2ffd7e4b8a7ff515aeab3a649036c6ef00740a55ed9f37bbfbe64a7645c526f.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3980-152-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3980-148-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3980-144-0x0000000000000000-mapping.dmp

  • memory/3980-149-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3980-145-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4028-154-0x0000000000520000-0x000000000056E000-memory.dmp

    Filesize

    312KB

  • memory/4028-137-0x0000000000000000-mapping.dmp

  • memory/4028-150-0x00000000004E0000-0x0000000000509000-memory.dmp

    Filesize

    164KB

  • memory/4152-139-0x0000000000000000-mapping.dmp

  • memory/4152-157-0x00000000012D0000-0x000000000131E000-memory.dmp

    Filesize

    312KB

  • memory/4152-155-0x00000000012D0000-0x000000000131E000-memory.dmp

    Filesize

    312KB

  • memory/4152-141-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4152-142-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4152-140-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4152-143-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4152-151-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4152-156-0x0000000000E40000-0x0000000000E69000-memory.dmp

    Filesize

    164KB

  • memory/4244-138-0x0000000000000000-mapping.dmp

  • memory/4244-153-0x0000000002840000-0x000000000288E000-memory.dmp

    Filesize

    312KB

  • memory/4284-134-0x00000000004B0000-0x00000000004C4000-memory.dmp

    Filesize

    80KB

  • memory/4752-133-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4752-136-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4752-132-0x0000000000000000-mapping.dmp

  • memory/4752-146-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB