Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:13

General

  • Target

    581ff408660c2cb45ddee68b3c4031f696cd68575842cca9160c5b0114acc7b2.exe

  • Size

    114KB

  • MD5

    5bc26371371794917f3b6250bdbd30a3

  • SHA1

    c9ae596b1991676da4d12b1dde8304ed5e24619a

  • SHA256

    581ff408660c2cb45ddee68b3c4031f696cd68575842cca9160c5b0114acc7b2

  • SHA512

    5b400deaab82ec4248cd587c5dad8f675eae3f0b68189f2452b67e29358c2b43b9922f05aa3ca3ec8a6135a2f3f85c49c7d9fd632eeadb110c8fc8aaef4f8e11

  • SSDEEP

    1536:XpNmtV24Ox/o5wuAmF2XjxShZCjz980T+ETOyXKz+Kc2:XpNmAHZawyIzIhkjzG0TPyyX2lc

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookAW 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\581ff408660c2cb45ddee68b3c4031f696cd68575842cca9160c5b0114acc7b2.exe
    "C:\Users\Admin\AppData\Local\Temp\581ff408660c2cb45ddee68b3c4031f696cd68575842cca9160c5b0114acc7b2.exe"
    1⤵
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of SetWindowsHookAW
    PID:1992
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x40c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB