Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe
Resource
win10v2004-20220812-en
General
-
Target
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe
-
Size
436KB
-
MD5
5dd6e69b1e9049f295e314b523679d98
-
SHA1
d17f17311a2142da92acd195c0511a4275193737
-
SHA256
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e
-
SHA512
8aa995067b8c399f2da65b9a302ded654f51a70bc93701801eb39564c344deebe577b891e3e23771494151360972c340c8261b573c15df24686d9cc431d59c2c
-
SSDEEP
6144:kX9Lng9HytfmZnn2gktn7DfDDBr+DvSIHqD9f9QIuIi5sy24R2RPk1w:yLnwlgPfDDBJHSwkck
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe" ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe -
Drops file in Windows directory 1 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exedescription ioc process File opened for modification C:\Windows\ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.INI ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exepid process 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 2376 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2376 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exepid process 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exedescription pid process Token: SeDebugPrivilege 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe Token: SeDebugPrivilege 2376 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exepid process 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe 1904 ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe"C:\Users\Admin\AppData\Local\Temp\ae47eec96331b3ac2a0de3345b6c7c977c266673cd4d264e1cffa5f5ce3fbf6e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1904-134-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1904-135-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1904-138-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2376-136-0x0000000003240000-0x000000000326E000-memory.dmpFilesize
184KB
-
memory/2376-137-0x0000000003270000-0x00000000032A3000-memory.dmpFilesize
204KB
-
memory/2376-139-0x00000000037D0000-0x0000000003803000-memory.dmpFilesize
204KB