Analysis

  • max time kernel
    92s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 11:38

General

  • Target

    3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe

  • Size

    428KB

  • MD5

    8d0ed51425b8b2572fa544279dfc011c

  • SHA1

    85a2bb9f5ddbc00550de40a001c2f2e239ed484e

  • SHA256

    3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d

  • SHA512

    a7b35405996c4b4eccf96b10b674e979150d86db30fee19acb0e38c53ea2fac02291179ff5ae0ae9fb3475db8c8fa5b0acc164c60f3959d29b4d3b7aebc2f633

  • SSDEEP

    6144:spjBmZ55Ue2KH7r5yN9JNcWxvRlGsB5HI:IjBgsPKH7r5i9Lx2u

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
    "C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe
      "C:\Users\Admin\AppData\Local\Temp\3e329ac73041fb1ec8fb8a9c5fef3818d040dbdf3e4790e1e91a3c763046a27d.exe"
      2⤵
      • Checks BIOS information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1264-132-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/1264-145-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/3928-136-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/3928-137-0x0000000000700000-0x0000000000742000-memory.dmp

    Filesize

    264KB

  • memory/3928-142-0x0000000000701000-0x000000000072B000-memory.dmp

    Filesize

    168KB

  • memory/3928-143-0x0000000000404000-0x0000000000405000-memory.dmp

    Filesize

    4KB

  • memory/3928-144-0x0000000000405000-0x0000000000406000-memory.dmp

    Filesize

    4KB

  • memory/3928-146-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB