Analysis

  • max time kernel
    199s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 00:15

General

  • Target

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe

  • Size

    323KB

  • MD5

    df315c4f845030a9be7d1488876cc4e7

  • SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

  • SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

  • SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • SSDEEP

    3072:poFmKj6DlEELLIy6IUqMCIpOGqZPJbWTlAyiGaP7a68Z3BuzmdKfhcDSx7tXDL3g:2FIlEQInIUIJiTF/azaPniJfhcuRxw

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe
    "C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2492
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /k ping 0 & del "C:\Users\Admin\AppData\Local\Temp\16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\PING.EXE
        ping 0
        3⤵
        • Runs ping.exe
        PID:4476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0E506CEBBC8B162CFB2D72DB4891DCAE

    Filesize

    56KB

    MD5

    93117bb4367b4baa48ecdd31629669a7

    SHA1

    51e5d34501de0916d73e9b284fcba36eeb583bbe

    SHA256

    dbc7582a0c313fe792bb4d32c5ec2503ff0d930670cbb12f99e918660ae959e0

    SHA512

    35ff3e0bf514bb6319d15fc2a4ca60c7e4b9bb598343d2a27e613f8ea6d1551b26aed833daaa4eb76a0404797d15c4e562392226a25d3d4986f4d40ae5f335e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\782D7E2BFB036A849A99FFA65C652D39

    Filesize

    1KB

    MD5

    3e114ec761746135c198e3a8604c60d1

    SHA1

    85df1be812790a7a25b243324719da7a7fe16c43

    SHA256

    f23af18690359105be6b0fa5ba8c860c3ac6e434d645c44ef4d7c11b7af67e51

    SHA512

    89424d38ff2b96f28f6a92f8a9f88c22d635f54d3f587d8a9bdd1dff134fdf592ed9f4373fdfc03e83b147c376502350760d3e82023f2028c78494f3c97fdcf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0E506CEBBC8B162CFB2D72DB4891DCAE

    Filesize

    244B

    MD5

    e8c0d67ec5e5eab817ff692efc9e8f59

    SHA1

    312f66428e54cf30e016dafb181cc149c8ebab8d

    SHA256

    8a75fbd5347df1ab4bfcc621b3b95bdb23c573e80120988cc374c8e98cea41a6

    SHA512

    c990244b2e486d3d9956a5b0cb687e0f286bb2b2a7e5fdeaf08e305e653ac8d4d7fdd08336602dd7fdb3f7c5d51bbbdc5567863a3451f3cf1ee8c3654c89c35b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\782D7E2BFB036A849A99FFA65C652D39

    Filesize

    252B

    MD5

    3a27362a0359a205d0b8385d9633fb33

    SHA1

    f1578e4d8f3c00b1b524c97cccbf4c4d45a99b78

    SHA256

    3b4c4185e07aafe5568515cc3056773e677a6e9469b6f7f5b6b6f82b2ae8dee0

    SHA512

    b7bcfa5f4b6624330598783e9f3e11b54ac1a67a72a7cf3c0208a213f0493de726116e955d72beaf1de660c344601b5c5448b1d3596e36ce5648cfd0cbf2dc9f

  • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe

    Filesize

    323KB

    MD5

    df315c4f845030a9be7d1488876cc4e7

    SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

    SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

    SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • C:\Users\Admin\AppData\Roaming\Programme Files(35.2)\svchost.exe

    Filesize

    323KB

    MD5

    df315c4f845030a9be7d1488876cc4e7

    SHA1

    2ca99ed76ac9a97a83408085c3595a0cc6bf64d8

    SHA256

    16f071ababad93825e960511a747d3ac689e8e2553e70412d7b06ce0654c32ea

    SHA512

    58a3ce33ace8d148f850f3323ab8e5e53e0104c5edd3cd63888235a385293c15c495b053e021ca89c5696da267f8788f397c47f9543088fef8da17de1a9f3b77

  • memory/872-132-0x00000000749E0000-0x0000000074F91000-memory.dmp

    Filesize

    5.7MB

  • memory/872-143-0x00000000749E0000-0x0000000074F91000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-133-0x0000000000000000-mapping.dmp

  • memory/2492-142-0x00000000749E0000-0x0000000074F91000-memory.dmp

    Filesize

    5.7MB

  • memory/2492-144-0x00000000749E0000-0x0000000074F91000-memory.dmp

    Filesize

    5.7MB

  • memory/2992-140-0x0000000000000000-mapping.dmp

  • memory/4476-141-0x0000000000000000-mapping.dmp