Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 01:14

General

  • Target

    77fbf815d231b9e69366d4b3d1bae246d0ff538f72cb694ac120e93ebe2cfe95.exe

  • Size

    84KB

  • MD5

    01465b11ffc67444e4950c47f3b6bb2e

  • SHA1

    9601370fcc4dc9b072111e9ddc17971702e8e955

  • SHA256

    77fbf815d231b9e69366d4b3d1bae246d0ff538f72cb694ac120e93ebe2cfe95

  • SHA512

    441ae1b2dd024db6785ce278c9cf050fdb9fcab65f2cadb4bcc298b19c8b002124651bfcaa3709102e27e1a7b2436cea5733391159e3a5f1e17e22ed1b3a3689

  • SSDEEP

    768:+3ncJu5hBXF2pmiq2V41xNmAFgGyi4XwP13GT9W28z/zMp5xAFiE3s:+3cJu5hBVWq2kN6LXwPVGT9lgA5gs

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2688
      • C:\Users\Admin\AppData\Local\Temp\77fbf815d231b9e69366d4b3d1bae246d0ff538f72cb694ac120e93ebe2cfe95.exe
        "C:\Users\Admin\AppData\Local\Temp\77fbf815d231b9e69366d4b3d1bae246d0ff538f72cb694ac120e93ebe2cfe95.exe"
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2688 -s 3516
        2⤵
        • Program crash
        PID:924
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2688 -s 7388
        2⤵
        • Program crash
        PID:4620
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 432 -p 2688 -ip 2688
      1⤵
        PID:1500
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 532 -p 2688 -ip 2688
        1⤵
          PID:560
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1532
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3424
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3948

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3948-140-0x000002E2AD3A0000-0x000002E2AD3A8000-memory.dmp

          Filesize

          32KB

        • memory/3948-142-0x000002EAAEA80000-0x000002EAAEAA0000-memory.dmp

          Filesize

          128KB

        • memory/3948-143-0x000002EAAF480000-0x000002EAAF4A0000-memory.dmp

          Filesize

          128KB

        • memory/3948-148-0x000002EAB100A000-0x000002EAB100D000-memory.dmp

          Filesize

          12KB

        • memory/3948-149-0x000002EAB100A000-0x000002EAB100D000-memory.dmp

          Filesize

          12KB

        • memory/3948-150-0x000002EAB100A000-0x000002EAB100D000-memory.dmp

          Filesize

          12KB

        • memory/3948-151-0x000002EAB100A000-0x000002EAB100D000-memory.dmp

          Filesize

          12KB

        • memory/3948-159-0x000002EAB1030000-0x000002EAB1033000-memory.dmp

          Filesize

          12KB

        • memory/3948-158-0x000002EAB1030000-0x000002EAB1033000-memory.dmp

          Filesize

          12KB

        • memory/3948-160-0x000002EAB1030000-0x000002EAB1033000-memory.dmp

          Filesize

          12KB