Analysis

  • max time kernel
    187s
  • max time network
    233s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:46

General

  • Target

    tmp.exe

  • Size

    405KB

  • MD5

    0e27480e43e0585cfae5e08a966dc9c8

  • SHA1

    a59d1be2fbf89a529745725933ca6e1f41d9b4ac

  • SHA256

    ac65f03a3be26aa47f5338570fe338e3d0a89a15d74d12089466540975f5654d

  • SHA512

    2cd5e128af8ab578178899973c79853fbc072e83880932cd26f9824cd3655bc2ea24400d78fc80ed5f9d7ff74aca7af47c1c186814f924b330c326fc43bd4728

  • SSDEEP

    6144:RWWmZUA+FX/TQB7Ysv5AvfITQocgDh+gDRUxBO:8WxA+FyvZug6T

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\ProgramData\Oracle\java.exe
      "C:\ProgramData\Oracle\java.exe" {9BD1DCD7-3729-4AF2-9B63-2C886FDD565E}
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5020
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\java.exe

    Filesize

    405KB

    MD5

    0e27480e43e0585cfae5e08a966dc9c8

    SHA1

    a59d1be2fbf89a529745725933ca6e1f41d9b4ac

    SHA256

    ac65f03a3be26aa47f5338570fe338e3d0a89a15d74d12089466540975f5654d

    SHA512

    2cd5e128af8ab578178899973c79853fbc072e83880932cd26f9824cd3655bc2ea24400d78fc80ed5f9d7ff74aca7af47c1c186814f924b330c326fc43bd4728

  • C:\ProgramData\Oracle\java.exe

    Filesize

    405KB

    MD5

    0e27480e43e0585cfae5e08a966dc9c8

    SHA1

    a59d1be2fbf89a529745725933ca6e1f41d9b4ac

    SHA256

    ac65f03a3be26aa47f5338570fe338e3d0a89a15d74d12089466540975f5654d

    SHA512

    2cd5e128af8ab578178899973c79853fbc072e83880932cd26f9824cd3655bc2ea24400d78fc80ed5f9d7ff74aca7af47c1c186814f924b330c326fc43bd4728

  • C:\Users\Admin\AppData\Local\Temp\{00CE3573-C146-41D7-8996-CFED23D62D28}

    Filesize

    288KB

    MD5

    30f08bf9de767c872a571e98daa89ee7

    SHA1

    4babc2ba6529e59349d9f70061bfb3dbe62c570a

    SHA256

    b99811ff223f75c0b58906ca3fa8e31e2dd19ab1f64e236e2408c44831b79262

    SHA512

    2b0656486e4640b30b0b55b9e3a960a731f2b8b65970d828986afbb15a17d382237fc2850e6e2b3562351a27006be90d21159250027325a85cb2725b2f8f4ffd

  • C:\Users\Admin\AppData\Local\Temp\{00CE3573-C146-41D7-8996-CFED23D62D28}

    Filesize

    288KB

    MD5

    30f08bf9de767c872a571e98daa89ee7

    SHA1

    4babc2ba6529e59349d9f70061bfb3dbe62c570a

    SHA256

    b99811ff223f75c0b58906ca3fa8e31e2dd19ab1f64e236e2408c44831b79262

    SHA512

    2b0656486e4640b30b0b55b9e3a960a731f2b8b65970d828986afbb15a17d382237fc2850e6e2b3562351a27006be90d21159250027325a85cb2725b2f8f4ffd

  • memory/212-132-0x0000000000000000-mapping.dmp

  • memory/4664-151-0x0000000000A00000-mapping.dmp

  • memory/4664-153-0x0000000002520000-0x0000000002570000-memory.dmp

    Filesize

    320KB

  • memory/5020-136-0x000001D4D8990000-0x000001D4D8992000-memory.dmp

    Filesize

    8KB

  • memory/5020-138-0x000001D4D8940000-mapping.dmp

  • memory/5020-135-0x000001D4D8940000-0x000001D4D8981000-memory.dmp

    Filesize

    260KB

  • memory/5020-140-0x000001D4DA470000-0x000001D4DA4C0000-memory.dmp

    Filesize

    320KB