Analysis

  • max time kernel
    141s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 04:50

General

  • Target

    c422eec0bd03d59b5246095314b6865fb82f0d382eee41cd7ced4bf37e6315cb.exe

  • Size

    810KB

  • MD5

    4ad2dd5e335dfe57708dfc0fb13d07d3

  • SHA1

    91e90771f64cfaed4e43230c6aaf20184b43e122

  • SHA256

    c422eec0bd03d59b5246095314b6865fb82f0d382eee41cd7ced4bf37e6315cb

  • SHA512

    a037d8d0c4dd605ed6ee6e7dd330139b491290fb5233bedad2cedb367cfbca74deca0cc42dd1b2f5aea3bb2c2ca02f39ceaf95c31eb9ad53b34d91e2a0138d3a

  • SSDEEP

    12288:Qt1pYbWCCdGSW+9bkjsu9RuEeJb3MOhO993aufhgv7GIpnX7mkNeCCtZvXiMfCy/:Qt2SLgjsv9gfavKqSkwCmvSMfCyeg

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c422eec0bd03d59b5246095314b6865fb82f0d382eee41cd7ced4bf37e6315cb.exe
    "C:\Users\Admin\AppData\Local\Temp\c422eec0bd03d59b5246095314b6865fb82f0d382eee41cd7ced4bf37e6315cb.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4244-132-0x0000000002520000-0x00000000026A3000-memory.dmp

    Filesize

    1.5MB

  • memory/4244-139-0x0000000002520000-0x00000000026A3000-memory.dmp

    Filesize

    1.5MB

  • memory/4244-140-0x0000000002520000-0x00000000026A3000-memory.dmp

    Filesize

    1.5MB

  • memory/4244-141-0x0000000002520000-0x00000000026A3000-memory.dmp

    Filesize

    1.5MB