Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:08

General

  • Target

    5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3.exe

  • Size

    136KB

  • MD5

    6314acf481191f819a0ebd01d305a1f7

  • SHA1

    42c54a11eec742d8775a4e31c230a2e0842f23cc

  • SHA256

    5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

  • SHA512

    beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

  • SSDEEP

    3072:mVSMX2hidyId0xJGZDtZiab4NlKy/0g5Ktcu:mlXGidyIKfGZDtZR4NlD5Ktcu

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3.exe
    "C:\Users\Admin\AppData\Local\Temp\5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3.exe
      C:\Users\Admin\AppData\Local\Temp\5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3.exe
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Users\Admin\AppData\Roaming\rundll32.exe
        "C:\Users\Admin\AppData\Roaming\rundll32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\Users\Admin\AppData\Roaming\rundll32.exe
          C:\Users\Admin\AppData\Roaming\rundll32.exe
          4⤵
          • Executes dropped EXE
          PID:4832
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 800
            5⤵
            • Program crash
            PID:112
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          C:\Users\Admin\AppData\Roaming\svchost.exe
          4⤵
          • Executes dropped EXE
          PID:8
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 704
            5⤵
            • Program crash
            PID:4948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 680
        3⤵
        • Program crash
        PID:1984
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4940 -ip 4940
    1⤵
      PID:1944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4832 -ip 4832
      1⤵
        PID:3392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 8 -ip 8
        1⤵
          PID:4696

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\rundll32.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • C:\Users\Admin\AppData\Roaming\rundll32.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • C:\Users\Admin\AppData\Roaming\rundll32.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          136KB

          MD5

          6314acf481191f819a0ebd01d305a1f7

          SHA1

          42c54a11eec742d8775a4e31c230a2e0842f23cc

          SHA256

          5988ca6923d4668970411878931bc3dd09fadbdcb267533108bcc3869b33e5c3

          SHA512

          beb509d721f0f987d236f9bb87fb95ae9470c93a6ce6efd9ec03213b6d9267eacafec8d364701c1391f37868222a1bda59c880217ac455bfeb1aa602f7fc634d

        • memory/8-156-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/8-151-0x0000000000000000-mapping.dmp

        • memory/8-157-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/992-146-0x0000000000000000-mapping.dmp

        • memory/4804-134-0x0000000003A60000-0x0000000003A64000-memory.dmp

          Filesize

          16KB

        • memory/4832-140-0x0000000000000000-mapping.dmp

        • memory/4832-150-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4900-137-0x0000000000000000-mapping.dmp

        • memory/4940-149-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4940-132-0x0000000000000000-mapping.dmp

        • memory/4940-136-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4940-133-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB