Analysis

  • max time kernel
    154s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 13:53

General

  • Target

    672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9.exe

  • Size

    1.1MB

  • MD5

    a839f776ee7530e6103af8bed948e5f1

  • SHA1

    91ffc80576d8d6236bc902a1803bd43bcf470c50

  • SHA256

    672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9

  • SHA512

    a1dc51335803777f746b6a46747201c160f873a7936f97885b453d17b657739a5d6c6899022317938a513108414d50135a6afe07b4d878014e7a0771297ccc84

  • SSDEEP

    24576:488FqvRKoPw8NEx4VmPmsDx7Gk+Reb0wW:48fRbE2VolvZW

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9.exe
    "C:\Users\Admin\AppData\Local\Temp\672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9.exe
      "C:\Users\Admin\AppData\Local\Temp\672a819c46ba648ea2ed982fb03a3393263a02a7a185d75a0895dfedd67b52e9.exe" Track="0001001000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:4044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4044-133-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4044-134-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4044-135-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4044-136-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4044-137-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB