Analysis

  • max time kernel
    282s
  • max time network
    351s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 07:52

General

  • Target

    561e701a01611e56ca9e64f581de88641900f9868500f5dd2345af8568f09206.exe

  • Size

    472KB

  • MD5

    02f658a3f8402fe92a8479bd96fe882a

  • SHA1

    46af34c41da90cb687b869bcefd48f772d625307

  • SHA256

    561e701a01611e56ca9e64f581de88641900f9868500f5dd2345af8568f09206

  • SHA512

    5089abc8b665155854b2a91f3ef9b5186a3aa834fc0064c38e2403629f3ec0ce4730c9bfee57c33c622576f26acfd48022790dec847be05e07e73f963adf3945

  • SSDEEP

    12288:TeWgbNNKD4dAdM7rro6XuLpQ82pkXcnNjPyI:T2nKDuAdMPvke82pkXEN7yI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:796
    • C:\Users\Admin\AppData\Local\Temp\561e701a01611e56ca9e64f581de88641900f9868500f5dd2345af8568f09206.exe
      "C:\Users\Admin\AppData\Local\Temp\561e701a01611e56ca9e64f581de88641900f9868500f5dd2345af8568f09206.exe"
      1⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4068

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\IusiCaqo\IusiCaqo.dat
      Filesize

      288KB

      MD5

      19b39e418c8742ae158b721731256adf

      SHA1

      dce3263c96cf93460aa3959aaa5c88e73ec71091

      SHA256

      71925978678f9878e2162a2d9ad867efee09b1cf7846f91e280d265fa1e528a4

      SHA512

      b624eeef84879815808fbcf64d995bdb492d90d98568130a4243d914acc85e7ffba809b497d328b9655e0a06e319451831d0eab2a1f4f8964a90f7badcb7fc44

    • memory/4068-132-0x0000000000400000-0x00000000004FE000-memory.dmp
      Filesize

      1016KB

    • memory/4068-133-0x0000000000400000-0x0000000000448000-memory.dmp
      Filesize

      288KB

    • memory/4068-135-0x0000000000400000-0x00000000004FE000-memory.dmp
      Filesize

      1016KB

    • memory/4068-137-0x0000000010000000-0x000000001006F000-memory.dmp
      Filesize

      444KB

    • memory/4068-138-0x0000000010000000-0x0000000010032000-memory.dmp
      Filesize

      200KB