Analysis

  • max time kernel
    169s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 01:49

General

  • Target

    8606cc21e6dbcc895ae345ca4d8a7fe7db3c3c4a70b563f151f1d3014f93b644.exe

  • Size

    92KB

  • MD5

    c6f9e587d4bd1d69b6aaa3158e3a93e3

  • SHA1

    f41068083a2e153eb865b68e6ddbac825210c8fc

  • SHA256

    8606cc21e6dbcc895ae345ca4d8a7fe7db3c3c4a70b563f151f1d3014f93b644

  • SHA512

    767d17bfacba995631cb17c5b5c28ef966933b16418c440b59c769e742bdd99205a1e702c12e34a99fa68d14e2c1ab2deb5e3a94042ea27f897b931b9a39b7ae

  • SSDEEP

    1536:wgPA1zDA0yULmND9SeLHuvZwRDmJ6hrwsHxinSZ6QQsol3bo8JlIU:qzDA0749jLOvyRKJ6hrpina6QRoBbo8X

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8606cc21e6dbcc895ae345ca4d8a7fe7db3c3c4a70b563f151f1d3014f93b644.exe
    "C:\Users\Admin\AppData\Local\Temp\8606cc21e6dbcc895ae345ca4d8a7fe7db3c3c4a70b563f151f1d3014f93b644.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4988
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39df855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4988-132-0x0000000001000000-0x0000000001018000-memory.dmp

    Filesize

    96KB

  • memory/4988-133-0x0000000001000000-0x0000000001018000-memory.dmp

    Filesize

    96KB