Analysis

  • max time kernel
    303s
  • max time network
    326s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2022, 03:35

General

  • Target

    ad5385a1c281d29e994f8f72bc089d6573a9680dff08943dd2237ac6917eed0a.exe

  • Size

    372KB

  • MD5

    31e5d146a9b6dae71c211c5f1b50a67a

  • SHA1

    a9adf28459bb94f782546b6fb989ba1a84559810

  • SHA256

    ad5385a1c281d29e994f8f72bc089d6573a9680dff08943dd2237ac6917eed0a

  • SHA512

    55e44f9b051e0b708057d6143c48bc07541c0202c007b2b061bb0a0a918d6f36c50889856b13589e6026cf3ecebad6fae8d41f7beb67d544a4bc63dc98c319d0

  • SSDEEP

    6144:1GkORa/mgnQXgZG9PvK6pu4Dx0DrQlqK3BvN+Vz1dbroBjQmafsQQRwbreMpY7Z:VOmmgnQb9K6pVD+QEK3BvN+mjQmafsQu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad5385a1c281d29e994f8f72bc089d6573a9680dff08943dd2237ac6917eed0a.exe
    "C:\Users\Admin\AppData\Local\Temp\ad5385a1c281d29e994f8f72bc089d6573a9680dff08943dd2237ac6917eed0a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sadEE05.tmp

    Filesize

    267KB

    MD5

    50d7a4da5f1a4f2999b0178ccec1320d

    SHA1

    443d543e7b8ffec0b84768728d38d8c285ec615f

    SHA256

    28e40d56758faad7a04678a6a2628a10eaa8df9f63f49460a65d539262453245

    SHA512

    0cdcb9e47db9e7c073381161386e9fddb19ab7848d456cbe26ab5ede44fd6ae04aab25c6dc438c458861651f1238e8ccb9976484c4d5e919cb25a5d52c165d7d

  • C:\Users\Admin\AppData\Local\Temp\sadEE05.tmp

    Filesize

    267KB

    MD5

    50d7a4da5f1a4f2999b0178ccec1320d

    SHA1

    443d543e7b8ffec0b84768728d38d8c285ec615f

    SHA256

    28e40d56758faad7a04678a6a2628a10eaa8df9f63f49460a65d539262453245

    SHA512

    0cdcb9e47db9e7c073381161386e9fddb19ab7848d456cbe26ab5ede44fd6ae04aab25c6dc438c458861651f1238e8ccb9976484c4d5e919cb25a5d52c165d7d

  • memory/2616-134-0x0000000001610000-0x0000000001658000-memory.dmp

    Filesize

    288KB

  • memory/2616-135-0x0000000007BF0000-0x0000000008194000-memory.dmp

    Filesize

    5.6MB

  • memory/2616-136-0x0000000007570000-0x0000000007602000-memory.dmp

    Filesize

    584KB

  • memory/2616-137-0x00000000074E0000-0x00000000074EA000-memory.dmp

    Filesize

    40KB

  • memory/2616-138-0x000000000B620000-0x000000000B686000-memory.dmp

    Filesize

    408KB

  • memory/2616-139-0x00000000107F0000-0x0000000010F96000-memory.dmp

    Filesize

    7.6MB