Analysis

  • max time kernel
    146s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 09:04

General

  • Target

    55574524900a8fb459d0050a00c64ac409c66c58084409e7492aec96cb265dd7.exe

  • Size

    27KB

  • MD5

    0c9ee4a8c45b7a5ce276bf629025b5ef

  • SHA1

    1b0a1ae737c9377eaf4bf406afd3870c8144d136

  • SHA256

    55574524900a8fb459d0050a00c64ac409c66c58084409e7492aec96cb265dd7

  • SHA512

    6fb7355bbdeca1c47de3473bcb3d414504266a92ff4c4ff586fe7918497a7f7604c78daf1239372cf79929f425130a7bbd79717e69b23e30187f58c0ff3eec95

  • SSDEEP

    384:u5kAWwLQORlWwOkmEzrU97+KqOyVWZpHVP8NkJ4snGF1DS5+W9781i5GiW4tDSh5:08O/WwOFIrugE4Ni8LzOilveez19zf

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55574524900a8fb459d0050a00c64ac409c66c58084409e7492aec96cb265dd7.exe
    "C:\Users\Admin\AppData\Local\Temp\55574524900a8fb459d0050a00c64ac409c66c58084409e7492aec96cb265dd7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:896
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1824
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x5a4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/896-54-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB

  • memory/896-55-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/896-56-0x0000000001FB0000-0x00000000023B7000-memory.dmp

    Filesize

    4.0MB

  • memory/1824-57-0x000007FEFC0B1000-0x000007FEFC0B3000-memory.dmp

    Filesize

    8KB

  • memory/1824-58-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB