Analysis

  • max time kernel
    202s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 01:11

General

  • Target

    bdccd2f1649d58f257ba32f083031727a87cb9f51ea78db4fd41e7f40b79d95a.exe

  • Size

    48KB

  • MD5

    a5a61745ad4806a4a49ba6c32c904f3d

  • SHA1

    035d1f4b445c38a7bde75f1746397e39bb416360

  • SHA256

    bdccd2f1649d58f257ba32f083031727a87cb9f51ea78db4fd41e7f40b79d95a

  • SHA512

    e513ba137e5651af44a9d9b49b2cdff270ad95119d6272aa8d4fbf8722e40dd2c47103137303a8b985b052d93d6a3bc9aa8c74b6ab8111676c9554f9ff66b1a6

  • SSDEEP

    768:hbdl2E31J4yBx4LZekcf/GmephJhwt9x/79:tdl2Er4GxeeFGAtf9

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdccd2f1649d58f257ba32f083031727a87cb9f51ea78db4fd41e7f40b79d95a.exe
    "C:\Users\Admin\AppData\Local\Temp\bdccd2f1649d58f257ba32f083031727a87cb9f51ea78db4fd41e7f40b79d95a.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{8A0DE44D-35E9-4257-C697-95BCF004F6D5}" /f
      2⤵
        PID:1124
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BDCCD2~1.EXE > nul
        2⤵
          PID:2260

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads