Analysis

  • max time kernel
    72s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 10:38

General

  • Target

    b8530172c75b4bc015af84448161265cd56b48c8d92e97e623ab5bf0fdcd3fe3.exe

  • Size

    135KB

  • MD5

    a22e749e93e700349342efb123affe50

  • SHA1

    2582ab409a295e10e1b54462a46fdc61a9b5beaa

  • SHA256

    b8530172c75b4bc015af84448161265cd56b48c8d92e97e623ab5bf0fdcd3fe3

  • SHA512

    bce75b7e7022f7ba8434f2f61f4cd23a94b2e24fa318c8b3696ee67d2c91ecdfa116071437f5b274b65bf28bb47e410080556f176d1bbab71ed150add56a35b3

  • SSDEEP

    3072:jmA6SzGc9rRUi9zcjBf020BaSwr2mrm6ks+gO6r682:6AFzGc9rRUgzc9fz0Bp2DmJNghmb

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8530172c75b4bc015af84448161265cd56b48c8d92e97e623ab5bf0fdcd3fe3.exe
    "C:\Users\Admin\AppData\Local\Temp\b8530172c75b4bc015af84448161265cd56b48c8d92e97e623ab5bf0fdcd3fe3.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:4148
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:4504
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          2⤵
            PID:1392
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            2⤵
              PID:1260
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              2⤵
                PID:4232
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                2⤵
                  PID:3104
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  2⤵
                    PID:2032
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    2⤵
                      PID:1284

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/1860-132-0x00000000753A0000-0x0000000075951000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1860-135-0x00000000753A0000-0x0000000075951000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1860-136-0x00000000753A0000-0x0000000075951000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/4148-133-0x0000000000000000-mapping.dmp

                  • memory/4504-134-0x0000000000000000-mapping.dmp