Analysis

  • max time kernel
    111s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 02:29

General

  • Target

    804cc7d77d9f53cb587416241aa89767149ce823093f2d138acf32b873f750ec.exe

  • Size

    1.5MB

  • MD5

    460a2feebbd8cc47d74be47addbcd795

  • SHA1

    41b8cfa4ff87ca04a921c332501f5ca3f6fcec80

  • SHA256

    804cc7d77d9f53cb587416241aa89767149ce823093f2d138acf32b873f750ec

  • SHA512

    c351fc99b822864443b5f4c07af1c277d75449312b31c52908cbcf0dba75d4b76533d54b30f0a4c4f9b0afa9dceee2640d3e707cc1c56d5912b9edf40801269a

  • SSDEEP

    12288:RZ5d+2GI8zw64vyhPDNgfo+5d653ySz5bpM3QBNNUOUVYysQB8Fo2yh36rF8y8MJ:/B8zw64vyhPDNgf7diyFUOYVCDDGIN

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\804cc7d77d9f53cb587416241aa89767149ce823093f2d138acf32b873f750ec.exe
    "C:\Users\Admin\AppData\Local\Temp\804cc7d77d9f53cb587416241aa89767149ce823093f2d138acf32b873f750ec.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3404
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 800
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4288

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2808-135-0x0000000074E40000-0x00000000753F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2808-138-0x0000000074E40000-0x00000000753F1000-memory.dmp

          Filesize

          5.7MB

        • memory/3404-133-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/3404-136-0x0000000074E40000-0x00000000753F1000-memory.dmp

          Filesize

          5.7MB

        • memory/3404-137-0x0000000074E40000-0x00000000753F1000-memory.dmp

          Filesize

          5.7MB