Analysis

  • max time kernel
    163s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2022, 23:11

General

  • Target

    b1370c9572bac3de497e2bb83c10176f225808ac7e64f18cbd11727df2c5730d.exe

  • Size

    5.3MB

  • MD5

    c533259dfa380f017ca0a91978d33ebe

  • SHA1

    ecc4a3de3beafc2391597f4eaf50316fcfbff33f

  • SHA256

    b1370c9572bac3de497e2bb83c10176f225808ac7e64f18cbd11727df2c5730d

  • SHA512

    f519c86c0a0d25c99edb3b768beee13d4ee080a931fd7f04cd908998a86ec17661e29cebba88420b9bf0b7b165eb2cc35daa6e31eb42dcf527d0be26f6aef8a8

  • SSDEEP

    98304:luAPrTfBAESfiPRt8NBhibpvATQ63tNVk7acLAkqNvE6jJAA6nIyLQ:g8rTfB7ey6Lilh633Vd/vpmLQ

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1370c9572bac3de497e2bb83c10176f225808ac7e64f18cbd11727df2c5730d.exe
    "C:\Users\Admin\AppData\Local\Temp\b1370c9572bac3de497e2bb83c10176f225808ac7e64f18cbd11727df2c5730d.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5084-132-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/5084-133-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB

  • memory/5084-134-0x0000000074A00000-0x0000000074FB1000-memory.dmp

    Filesize

    5.7MB