Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 02:41

General

  • Target

    3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe

  • Size

    586KB

  • MD5

    856401f79397ae093d5fd7795007d900

  • SHA1

    c03525fe8d9222fcdc7a6efba2063b671c95b690

  • SHA256

    3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540

  • SHA512

    d4d9dd5d6d650c2e42d4da859b3a93fe830faf31217a830df90a75e63c3cc243a62bc3cf0f0d847c260f386afe36cd4ff044121d1a8982bf80005e7e98abadd2

  • SSDEEP

    12288:NdmNDwtZF4951xlMfa780coTAHp9/VjbyOogKN1:NwNDwKflMS8VoWp9djed

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe
    "C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:304
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:1952
        • C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe
          "C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
            dw20.exe -x -s 388
            3⤵
              PID:920
          • C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe
            "C:\Users\Admin\AppData\Local\Temp\3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540.exe"
            2⤵
              PID:2012

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\side.exe
            Filesize

            586KB

            MD5

            856401f79397ae093d5fd7795007d900

            SHA1

            c03525fe8d9222fcdc7a6efba2063b671c95b690

            SHA256

            3a78a6628941523d37bbad5ab0247b537636635a5be16aa680a550971918a540

            SHA512

            d4d9dd5d6d650c2e42d4da859b3a93fe830faf31217a830df90a75e63c3cc243a62bc3cf0f0d847c260f386afe36cd4ff044121d1a8982bf80005e7e98abadd2

          • memory/304-55-0x0000000000000000-mapping.dmp
          • memory/920-86-0x0000000000000000-mapping.dmp
          • memory/1480-54-0x0000000076201000-0x0000000076203000-memory.dmp
            Filesize

            8KB

          • memory/1480-58-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/1480-87-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/1952-56-0x0000000000000000-mapping.dmp
          • memory/2012-78-0x000000000043B58E-mapping.dmp
          • memory/2012-76-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-90-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/2012-85-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/2012-82-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-70-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-68-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-74-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-80-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2012-77-0x0000000000400000-0x0000000000440000-memory.dmp
            Filesize

            256KB

          • memory/2036-64-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-62-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-73-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-69-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-84-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/2036-66-0x000000000044C2BE-mapping.dmp
          • memory/2036-60-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-59-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB

          • memory/2036-89-0x0000000074350000-0x00000000748FB000-memory.dmp
            Filesize

            5.7MB

          • memory/2036-65-0x0000000000400000-0x000000000047C000-memory.dmp
            Filesize

            496KB