Analysis

  • max time kernel
    150s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:22

General

  • Target

    57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe

  • Size

    454KB

  • MD5

    23a6dcd59e3002ed0943c7db1b7c8f73

  • SHA1

    14593e793ad0bb14251da90481d53001885e3bc8

  • SHA256

    57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f

  • SHA512

    3a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc

  • SSDEEP

    6144:o2Kgo6ZWWeTfIE11KjyU5GUvvbwN+r+hOeG5FQGUP3ExX:o96ZWWwIEvKr5GfNMeG5Sk

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe
    "C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe
      "C:\Users\Admin\AppData\Local\Temp\57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe
        "C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe
          "C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2132
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe" /i:2132
            5⤵
              PID:2192

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe

            Filesize

            454KB

            MD5

            23a6dcd59e3002ed0943c7db1b7c8f73

            SHA1

            14593e793ad0bb14251da90481d53001885e3bc8

            SHA256

            57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f

            SHA512

            3a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc

          • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe

            Filesize

            454KB

            MD5

            23a6dcd59e3002ed0943c7db1b7c8f73

            SHA1

            14593e793ad0bb14251da90481d53001885e3bc8

            SHA256

            57f97d1e53350ff7c4d9c9fc8cfe8e0d6bfcc6e620b29050bd0170c8e801a07f

            SHA512

            3a13205f47fd1a202451af1cb49d4037a62f0784f2f6c5e0639d1900b8df064abb5a15dba9fa7b637d37611d71013dfd37d37489d6a586f6f581b02882743ffc

          • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe

            Filesize

            454KB

            MD5

            f1c449862b61e963a24f2c5091ae2a2d

            SHA1

            0ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28

            SHA256

            a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f

            SHA512

            3ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6

          • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe

            Filesize

            454KB

            MD5

            f1c449862b61e963a24f2c5091ae2a2d

            SHA1

            0ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28

            SHA256

            a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f

            SHA512

            3ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6

          • C:\ProgramData\A1qyFgzVppp1bYb\Uwwq3RDx.exe

            Filesize

            454KB

            MD5

            f1c449862b61e963a24f2c5091ae2a2d

            SHA1

            0ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28

            SHA256

            a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f

            SHA512

            3ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6

          • C:\Users\Admin\AppData\Local\Temp\mWpGQKM6S1m72az.exe

            Filesize

            454KB

            MD5

            f1c449862b61e963a24f2c5091ae2a2d

            SHA1

            0ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28

            SHA256

            a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f

            SHA512

            3ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6

          • C:\Users\Admin\AppData\Local\Temp\mWpGQKM6S1m72az.exe

            Filesize

            454KB

            MD5

            f1c449862b61e963a24f2c5091ae2a2d

            SHA1

            0ccb10c7d735104da9e3e9e5e2cb62de7d1f0a28

            SHA256

            a186cb9c429cbe4b394b94769112da80b37530d1cd2f7ea98e74ecef52e7150f

            SHA512

            3ddcda41e79347088dda9829f4d6c3fd09618e6bce625b9f163f4d6f057d99028939a0b87a905c8624709e106ff4f479426731210326281df6d14601aca35dd6

          • memory/2132-148-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2132-156-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2192-157-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4364-142-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4364-135-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4364-138-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4364-133-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/4364-134-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB