Analysis

  • max time kernel
    359s
  • max time network
    379s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:20

General

  • Target

    ad574071c80a4c845347b11ac455722fca2c44af11e1414cbd705c5756fcffc0.exe

  • Size

    27KB

  • MD5

    84fd94dc7aaf2d4870c7854fea55dca5

  • SHA1

    ba699e769b0002d38701bc5ab8669a28dd4af40d

  • SHA256

    ad574071c80a4c845347b11ac455722fca2c44af11e1414cbd705c5756fcffc0

  • SHA512

    67a3fe713c34c0ceb0585abffcee8f7d7abc4bfd066a12f6c4a6c1e154913ef464389d3e9fac0bb1c9d37be08cbd05bdb5686680bda0ad6dfa308f2030307982

  • SSDEEP

    384:u5k3WwLQORlWwOkmEzrU97+KqOyVWZpHVP8NkJ4snGF1DS5+W9781i5GiW4tDShI:l8O/WwOFIrugE4Ni8LzOilveezn9zs

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad574071c80a4c845347b11ac455722fca2c44af11e1414cbd705c5756fcffc0.exe
    "C:\Users\Admin\AppData\Local\Temp\ad574071c80a4c845347b11ac455722fca2c44af11e1414cbd705c5756fcffc0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4132
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4220
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2408
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3860

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3860-143-0x000002B36C440000-0x000002B36C460000-memory.dmp

          Filesize

          128KB

        • memory/3860-144-0x000002B36C4E0000-0x000002B36C500000-memory.dmp

          Filesize

          128KB

        • memory/3860-145-0x000002B36B2D0000-0x000002B36B2D8000-memory.dmp

          Filesize

          32KB

        • memory/4132-132-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/4132-133-0x0000000002330000-0x0000000002737000-memory.dmp

          Filesize

          4.0MB

        • memory/4132-134-0x0000000002330000-0x0000000002737000-memory.dmp

          Filesize

          4.0MB