Analysis

  • max time kernel
    214s
  • max time network
    225s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:40

General

  • Target

    2f3612e8483adc626cef799bd6b9cb2b3489be5563384c2c2f8bf086d99cf5b6.exe

  • Size

    162KB

  • MD5

    69f263dce3eaafef1208d56af7f291f9

  • SHA1

    f75b33d4f9e292902ee7c25c3744b8b41f6d6774

  • SHA256

    2f3612e8483adc626cef799bd6b9cb2b3489be5563384c2c2f8bf086d99cf5b6

  • SHA512

    f4654b0d6dfc0fbbcc8b800f1b88b33025795bf325363a61b88b4968aa8588c824e8fad96d7d489821cec262d01c02111d9e256c53b213837d463c03b03b3f9c

  • SSDEEP

    3072:yEPmkkA8rAWJvXvxO2pbRNXu3u+RRn+ppXW1CJXJxJUe28jLlVPth83H1mjz1kH:tujAWxvxnPNqjRR+zW18JUaLzbgVR

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\2f3612e8483adc626cef799bd6b9cb2b3489be5563384c2c2f8bf086d99cf5b6.exe
      "C:\Users\Admin\AppData\Local\Temp\2f3612e8483adc626cef799bd6b9cb2b3489be5563384c2c2f8bf086d99cf5b6.exe"
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\{e0613d90-9b67-ae60-58f9-584af5f18b89}\n

    Filesize

    42KB

    MD5

    bfa0c9ec67cd0f1b2dabfc7777aae294

    SHA1

    c15a4686bda91546e4c3abba58530423c40da3dc

    SHA256

    f3a8ac1721abb9068c5c281dafeaebdf3a66f96954c9e882ef71dee9c44bc585

    SHA512

    e2e7b989e17dcf2f0c2b93e53671a6f34230b31b0daa152fd9ec84aa14055b1350960d5dbc7da02a03d4eda7c68f9082f6c8be053ec56c0bed5b2bd0ef38556f

  • C:\Users\Admin\AppData\Local\{e0613d90-9b67-ae60-58f9-584af5f18b89}\n

    Filesize

    42KB

    MD5

    bfa0c9ec67cd0f1b2dabfc7777aae294

    SHA1

    c15a4686bda91546e4c3abba58530423c40da3dc

    SHA256

    f3a8ac1721abb9068c5c281dafeaebdf3a66f96954c9e882ef71dee9c44bc585

    SHA512

    e2e7b989e17dcf2f0c2b93e53671a6f34230b31b0daa152fd9ec84aa14055b1350960d5dbc7da02a03d4eda7c68f9082f6c8be053ec56c0bed5b2bd0ef38556f

  • memory/3496-132-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3496-133-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3496-134-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3496-135-0x00000000004B0000-0x00000000004DF000-memory.dmp

    Filesize

    188KB

  • memory/3496-138-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB