Analysis

  • max time kernel
    201s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 08:03

General

  • Target

    ece5906bcd1a3e89217439cefab0a026a092ab31a1c2368b302394477b7fdf3f.exe

  • Size

    810KB

  • MD5

    7b84f21ece5a088b8dec6cb70bb75b67

  • SHA1

    6a57404715c0ae6f93cc64a32be03569f590161a

  • SHA256

    ece5906bcd1a3e89217439cefab0a026a092ab31a1c2368b302394477b7fdf3f

  • SHA512

    21b56e29b600aa3d680b12d1b8ce50b2541ce4a4b73d4d7c766c34b34f2e119286744c51d9f95a0cc3129fe76232ff747c37950b0099b998c6eb683a0fe1742c

  • SSDEEP

    24576:817GsWFnZLlAo1Bvv12XV7cI7p1k4vPFk3tPFiiA:2UnBl/UXVIkjPFk3ZA

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ece5906bcd1a3e89217439cefab0a026a092ab31a1c2368b302394477b7fdf3f.exe
    "C:\Users\Admin\AppData\Local\Temp\ece5906bcd1a3e89217439cefab0a026a092ab31a1c2368b302394477b7fdf3f.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3284-132-0x0000000002990000-0x0000000002B13000-memory.dmp

    Filesize

    1.5MB

  • memory/3284-139-0x0000000002990000-0x0000000002B13000-memory.dmp

    Filesize

    1.5MB

  • memory/3284-140-0x0000000002990000-0x0000000002B13000-memory.dmp

    Filesize

    1.5MB

  • memory/3284-141-0x0000000002990000-0x0000000002B13000-memory.dmp

    Filesize

    1.5MB