Analysis

  • max time kernel
    158s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 04:28

General

  • Target

    0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe

  • Size

    246KB

  • MD5

    c8463daea4102c69d04d025dc2a40639

  • SHA1

    c10d84b0d9106d6c149065f983e60f93225b9f3c

  • SHA256

    0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9

  • SHA512

    a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc

  • SSDEEP

    6144:pYiSDS6NLK9biG42JKsvt9tcjvpP90ZNMF2qIccnd:LSNFmz427vtPcjd90HA2q3yd

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
    "C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
      C:\Users\Admin\AppData\Local\Temp\0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Volume\FD9D74533BF.exe
        "C:\Volume\FD9D74533BF.exe"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4560
        • C:\Volume\FD9D74533BF.exe
          C:\Volume\FD9D74533BF.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe
            "C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\Users\Admin\AppData\Local\Temp\VUZ30C4.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\Volume\C87200858227858

    Filesize

    63KB

    MD5

    ab687f60baf8c93020f6246363fc2298

    SHA1

    dd8487583b7b093d2d4a953c4e77d84b29aee4a1

    SHA256

    245441e9ca958c500903d33a5df07848e37ce54f786f46578251ca0552104cb5

    SHA512

    8fae2d5696971394b8c839f13dfb7372a318e16016fad50933993f1798f228b3fef5dfc38ef85f8e14e811ebba8a1ffb295e2014e796605c613807364a1cf02a

  • C:\Volume\FD9D74533BF.exe

    Filesize

    246KB

    MD5

    c8463daea4102c69d04d025dc2a40639

    SHA1

    c10d84b0d9106d6c149065f983e60f93225b9f3c

    SHA256

    0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9

    SHA512

    a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc

  • C:\Volume\FD9D74533BF.exe

    Filesize

    246KB

    MD5

    c8463daea4102c69d04d025dc2a40639

    SHA1

    c10d84b0d9106d6c149065f983e60f93225b9f3c

    SHA256

    0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9

    SHA512

    a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc

  • C:\Volume\FD9D74533BF.exe

    Filesize

    246KB

    MD5

    c8463daea4102c69d04d025dc2a40639

    SHA1

    c10d84b0d9106d6c149065f983e60f93225b9f3c

    SHA256

    0df2453eea4251dd0bc4fcb7f97fa78817d83dd1777aca2038c4286c1625ecf9

    SHA512

    a7a814378982b9f787fe462d7c5f47b00d0cd519739df0765a8f14b2e62fc63bc0d0f00f46a359526dacf2a7ee19003f72b2275f7ab320b4f6e44afaafa6e6cc

  • memory/2848-158-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2848-159-0x00000000008A0000-0x00000000008EE000-memory.dmp

    Filesize

    312KB

  • memory/2848-153-0x00000000008A0000-0x0000000000990000-memory.dmp

    Filesize

    960KB

  • memory/2848-151-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2848-150-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-138-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-140-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3240-161-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3240-139-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-160-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-137-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-136-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-135-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3240-133-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3308-172-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-185-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-152-0x00000000008A0000-0x00000000008EE000-memory.dmp

    Filesize

    312KB

  • memory/3308-162-0x0000000000410000-0x0000000000415000-memory.dmp

    Filesize

    20KB

  • memory/3308-165-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

    Filesize

    24KB

  • memory/3308-164-0x00000000008A0000-0x00000000008EE000-memory.dmp

    Filesize

    312KB

  • memory/3308-166-0x0000000000BD0000-0x0000000000BDD000-memory.dmp

    Filesize

    52KB

  • memory/3308-163-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3308-168-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-169-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-170-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-171-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-208-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3308-173-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-174-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-175-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-176-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-177-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-178-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-179-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-180-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-181-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-182-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-183-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-184-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-186-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-187-0x00000000027A0000-0x00000000028BA000-memory.dmp

    Filesize

    1.1MB

  • memory/3308-188-0x0000000000FF0000-0x0000000000FF5000-memory.dmp

    Filesize

    20KB

  • memory/3308-189-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3308-190-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3308-191-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3308-192-0x000000000BB06000-0x000000000BB08000-memory.dmp

    Filesize

    8KB

  • memory/3308-193-0x0000000077100000-0x00000000772A3000-memory.dmp

    Filesize

    1.6MB

  • memory/3308-194-0x000000000BB05000-0x000000000BB07000-memory.dmp

    Filesize

    8KB

  • memory/3308-195-0x000000000BB04000-0x000000000BB06000-memory.dmp

    Filesize

    8KB

  • memory/3308-196-0x0000000074AD0000-0x0000000074F20000-memory.dmp

    Filesize

    4.3MB

  • memory/3308-197-0x00000000028D0000-0x00000000028DD000-memory.dmp

    Filesize

    52KB

  • memory/3308-198-0x00000000028E0000-0x00000000028E5000-memory.dmp

    Filesize

    20KB

  • memory/3308-199-0x0000000074AD0000-0x0000000074F20000-memory.dmp

    Filesize

    4.3MB

  • memory/3308-200-0x0000000002790000-0x0000000002795000-memory.dmp

    Filesize

    20KB

  • memory/3308-201-0x0000000074FC0000-0x0000000075023000-memory.dmp

    Filesize

    396KB

  • memory/3308-202-0x000000000BB18000-0x000000000BB1A000-memory.dmp

    Filesize

    8KB

  • memory/3308-203-0x0000000000410000-0x0000000000415000-memory.dmp

    Filesize

    20KB

  • memory/3308-204-0x00000000008A0000-0x00000000008EE000-memory.dmp

    Filesize

    312KB

  • memory/3308-205-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

    Filesize

    24KB

  • memory/3308-206-0x0000000000BD0000-0x0000000000BDD000-memory.dmp

    Filesize

    52KB

  • memory/3308-207-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB