Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 19:42

General

  • Target

    ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe

  • Size

    175KB

  • MD5

    6ee0c1fc959b376ced4252a868cabc5e

  • SHA1

    95e50f96119965972825ca42e401d12fa733b58c

  • SHA256

    ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690

  • SHA512

    e0c08ddfda3241550c255a2283940e9e9caec5747c9585b6d0da1c250b9a26c5ba8c715de379e64b83239bfdcb089d64581752e3753da2a4f2105d26a58b4a92

  • SSDEEP

    3072:vI6E88QrF4hB2E4UVa1rZC43gP1rBcqGAiHR2EpZ5UXAHs5Qw//59cQqpAc/r:g6K24hIUVeOgHRdpXUXwOHO7/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe
      "C:\Users\Admin\AppData\Local\Temp\ab94dcb875f73bc474e03f77ad827fb0659fe94b531e1eab7af1c26bbda33690.exe"
      2⤵
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:4816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\$bfcb9398bfb2ca3f1731e604ea3da242\n

    Filesize

    25KB

    MD5

    9e0cd37b6d0809cf7d5fa5b521538d0d

    SHA1

    411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

    SHA256

    55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

    SHA512

    b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

  • C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\$bfcb9398bfb2ca3f1731e604ea3da242\n

    Filesize

    25KB

    MD5

    9e0cd37b6d0809cf7d5fa5b521538d0d

    SHA1

    411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

    SHA256

    55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

    SHA512

    b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

  • memory/2056-137-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-138-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-140-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-141-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-139-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-142-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-143-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-144-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-146-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-145-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-147-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-148-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-149-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-150-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-151-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-152-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-153-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-154-0x0000000002470000-0x0000000002480000-memory.dmp

    Filesize

    64KB

  • memory/2056-155-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-156-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-157-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

    Filesize

    64KB

  • memory/2056-158-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-159-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-160-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-161-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-162-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-163-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-164-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-165-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-166-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-167-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-168-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-169-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-170-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-171-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-172-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-173-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-174-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-175-0x0000000002D00000-0x0000000002D10000-memory.dmp

    Filesize

    64KB

  • memory/2056-176-0x0000000002D00000-0x0000000002D10000-memory.dmp

    Filesize

    64KB

  • memory/2056-177-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/2056-178-0x0000000002D00000-0x0000000002D10000-memory.dmp

    Filesize

    64KB

  • memory/2056-179-0x0000000002D00000-0x0000000002D10000-memory.dmp

    Filesize

    64KB

  • memory/2056-180-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/2056-181-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-182-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-184-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-185-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-186-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-183-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-187-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-188-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-189-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-190-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-191-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-192-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-193-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-194-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-195-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-196-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-197-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/2056-198-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/2056-199-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/4896-135-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4896-136-0x000000000062F000-0x0000000000648000-memory.dmp

    Filesize

    100KB