Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 23:16

General

  • Target

    a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe

  • Size

    336KB

  • MD5

    ec4d618512c10e518cbbcc425e54e612

  • SHA1

    a841f69420290e7f1b4813f4cd141e9a59a73a53

  • SHA256

    a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926

  • SHA512

    526a529445e18e8b9c3d8a55c49c88867249a127a2ebaf75af543f4aaa9ede23888b89bc89adbc5c7160208c66c9bec0b8922f181a750c2691e59e88d9db8f92

  • SSDEEP

    6144:pp5aU24gcouSCLo/4A9497IkCxxFrFDRymDLOWve1cCAuT/:ppt24gc+CZA94NIJFxDhLve1Am

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
    "C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe
      "C:\Users\Admin\AppData\Local\Temp\a0166b750e8a6fa96f813879e93593fdaef75ff63fad688e22d8beb4246f3926.exe"
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4280-138-0x0000000000000000-mapping.dmp

  • memory/4280-140-0x0000000000240000-0x0000000000673000-memory.dmp

    Filesize

    4.2MB

  • memory/4280-141-0x0000000000C60000-0x0000000000C65000-memory.dmp

    Filesize

    20KB

  • memory/4280-142-0x0000000002B60000-0x0000000002FB0000-memory.dmp

    Filesize

    4.3MB

  • memory/4656-134-0x0000000000000000-mapping.dmp

  • memory/4656-135-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4656-137-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4656-139-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB