Analysis

  • max time kernel
    94s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 02:31

General

  • Target

    ac125662ec4fc640d476c709b0182f3a2c80947fd8115c826b6f4051253cf397.exe

  • Size

    836KB

  • MD5

    1f002be2bec961bf5843dd1bfdbbc74e

  • SHA1

    772cb355487e60a19e1163c9fa3a2de388933c24

  • SHA256

    ac125662ec4fc640d476c709b0182f3a2c80947fd8115c826b6f4051253cf397

  • SHA512

    7c951df56ebb13ede44bc50e8c9df1198500fcf932ee48117482aec497ec11c7b8be7a561a14b0f4342ac2986985402679687aee75444e90516975dce44bbf2b

  • SSDEEP

    24576:VLbESrsLaGA+o87q+mZf1WQP9Oae1j03H:dIAUd275xlOjSH

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac125662ec4fc640d476c709b0182f3a2c80947fd8115c826b6f4051253cf397.exe
    "C:\Users\Admin\AppData\Local\Temp\ac125662ec4fc640d476c709b0182f3a2c80947fd8115c826b6f4051253cf397.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1352-132-0x0000000002640000-0x00000000027C4000-memory.dmp

    Filesize

    1.5MB

  • memory/1352-140-0x0000000002640000-0x00000000027C4000-memory.dmp

    Filesize

    1.5MB

  • memory/1352-139-0x0000000002640000-0x00000000027C4000-memory.dmp

    Filesize

    1.5MB

  • memory/1352-141-0x0000000002640000-0x00000000027C4000-memory.dmp

    Filesize

    1.5MB