Analysis

  • max time kernel
    92s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 17:03

General

  • Target

    19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe

  • Size

    244KB

  • MD5

    a5babd8d1f956171ec86accfb29390b9

  • SHA1

    5173a227d44217f49e49fc03e012916744569e41

  • SHA256

    19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3

  • SHA512

    db31f3ec31c7d44c6ad31fc9b7cb19909987fcbc943789d43a7ea055ec25e310917e48540e4cb0a70e2ad68e8356545229ed947e5a5b8e45bf6a7aacd1fe3625

  • SSDEEP

    3072:qR2qXJTwoUl1lPya245z3vfdHldhwR+OGa0A9/JRJivjXrgk5aAPI44rx1Oya33a:qhFqf124usM4+x1OyaH03Aht4

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe
    "C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe
      C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe
        "C:\Users\Admin\AppData\Local\Temp\19873c20e95f96b17e46b177f188b9cd7ae7432a55cfd4063d45400e91ffd3d3.exe"
        3⤵
          PID:1864
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 84
            4⤵
            • Program crash
            PID:2848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1864 -ip 1864
      1⤵
        PID:1216

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4872-134-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4872-136-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4872-140-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4872-143-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/5072-132-0x0000000074850000-0x0000000074E01000-memory.dmp

              Filesize

              5.7MB

            • memory/5072-137-0x0000000074850000-0x0000000074E01000-memory.dmp

              Filesize

              5.7MB