Analysis

  • max time kernel
    194s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 12:38

General

  • Target

    fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe

  • Size

    178KB

  • MD5

    10a1d3076e341bc58eb877812af28831

  • SHA1

    4ac987f8d220168d089d86f3e47810f67fb4c889

  • SHA256

    fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9

  • SHA512

    9f45ef560a8e3091d232032656810f31521ae7913fe5a437d80b3065e791decf5722c70a9283f19bb59acb3ad1508d2cdaf3535fcf85c564b85fb0f364e93579

  • SSDEEP

    3072:ovbnG14mgBkAV7y9rwOWqdIQhY4IC4ilDG0UQ2Vf8RjPrd:AGGkAc9tdIOYC4iFUQ2BAzrd

Score
8/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Unexpected DNS network traffic destination 8 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe
      "C:\Users\Admin\AppData\Local\Temp\fa6f80a2025801716693f71334a2fed9c0821eaf42a9af8734b6e100840412a9.exe"
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1788-135-0x00000000004A3000-0x00000000004C6000-memory.dmp

    Filesize

    140KB

  • memory/1788-133-0x00000000004A3000-0x00000000004C6000-memory.dmp

    Filesize

    140KB

  • memory/1788-132-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2628-142-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-144-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-137-0x00000000012D0000-0x00000000012E0000-memory.dmp

    Filesize

    64KB

  • memory/2628-138-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-139-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-140-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-141-0x00000000012D0000-0x00000000012E0000-memory.dmp

    Filesize

    64KB

  • memory/2628-134-0x00000000012A0000-0x00000000012A8000-memory.dmp

    Filesize

    32KB

  • memory/2628-143-0x00000000012F0000-0x0000000001300000-memory.dmp

    Filesize

    64KB

  • memory/2628-136-0x0000000001350000-0x0000000001360000-memory.dmp

    Filesize

    64KB

  • memory/2628-145-0x0000000001350000-0x0000000001360000-memory.dmp

    Filesize

    64KB

  • memory/2628-146-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-147-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-148-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-149-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-150-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-151-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-152-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB

  • memory/2628-153-0x0000000001300000-0x0000000001310000-memory.dmp

    Filesize

    64KB