Analysis

  • max time kernel
    143s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 17:40

General

  • Target

    5c8c2e8e87cd3cdf48883cc6e702b29e9db16e80972c7c4c8d7049d6a3475e2f.exe

  • Size

    278KB

  • MD5

    47cab2df770bfb3b5e4e741229d029fd

  • SHA1

    7484bee01b8e41999c69e56aea0f5f9eda25279e

  • SHA256

    5c8c2e8e87cd3cdf48883cc6e702b29e9db16e80972c7c4c8d7049d6a3475e2f

  • SHA512

    51df63231c430c17e84dd40034e212182db17325fd49c391eef2f35c62344130f761138bdb4cb2d8ab4628a99158f03a1d77241d33accc98bd1c94be277501df

  • SSDEEP

    6144:3bw0Oxjh1imhqrI4geQo6A7CQe+04FwKg2zM8bT7/:3fkhqR6Abr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\5c8c2e8e87cd3cdf48883cc6e702b29e9db16e80972c7c4c8d7049d6a3475e2f.exe
      "C:\Users\Admin\AppData\Local\Temp\5c8c2e8e87cd3cdf48883cc6e702b29e9db16e80972c7c4c8d7049d6a3475e2f.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS3907~1.BAT"
        3⤵
        • Deletes itself
        PID:1200
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1204
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1124

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\ms3907252.bat

        Filesize

        201B

        MD5

        20f2bbb6596d2e2346e8bca60f2774e0

        SHA1

        7dc5ea676aeb686a4e34c120a34159e72062d921

        SHA256

        a517f37393809585549f9ab6cadf353074d913176466f721c10cace3d360a4a3

        SHA512

        9c080a11e48340c66cd7c24f98abceb7b4ff5be97c829e298f3e2078522d8babdcd0ad7493ff27da184c769e3d1f027976ff9a6394ac540b72316a5c28d4a1b6

      • memory/1124-68-0x0000000036D90000-0x0000000036DA0000-memory.dmp

        Filesize

        64KB

      • memory/1124-70-0x0000000000320000-0x0000000000337000-memory.dmp

        Filesize

        92KB

      • memory/1200-57-0x0000000000000000-mapping.dmp

      • memory/1204-69-0x0000000036D90000-0x0000000036DA0000-memory.dmp

        Filesize

        64KB

      • memory/1204-71-0x00000000001A0000-0x00000000001B7000-memory.dmp

        Filesize

        92KB

      • memory/1280-58-0x0000000001DA0000-0x0000000001DB7000-memory.dmp

        Filesize

        92KB

      • memory/1280-61-0x0000000036D90000-0x0000000036DA0000-memory.dmp

        Filesize

        64KB

      • memory/1280-72-0x0000000001DA0000-0x0000000001DB7000-memory.dmp

        Filesize

        92KB

      • memory/1764-54-0x0000000075891000-0x0000000075893000-memory.dmp

        Filesize

        8KB

      • memory/1764-60-0x0000000000140000-0x000000000014E000-memory.dmp

        Filesize

        56KB

      • memory/1764-62-0x0000000000EB0000-0x0000000000EFE000-memory.dmp

        Filesize

        312KB