Analysis

  • max time kernel
    152s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 13:42

General

  • Target

    c3a0da9d5e55ec45df45593074d83aefb3935aaa5ea3b1a75adc6aedb85b9b40.exe

  • Size

    180KB

  • MD5

    558cf03642d1f59d58b2aea6fd4d0848

  • SHA1

    270ce62f859508b6339f24ac26111a7bd3c851e6

  • SHA256

    c3a0da9d5e55ec45df45593074d83aefb3935aaa5ea3b1a75adc6aedb85b9b40

  • SHA512

    7f446b9005a4f21d3f3660d99da9499c32d2ea750688752b31c792bf30f97f3a04bdd462e634a2f612324ae8cd4cd9cff55d2242cee3253aade67a99b67f2f2e

  • SSDEEP

    3072:ufimO4AYcpO4D2rdUz41Vnkz/XFm7cMW5Mz5OiqdwsnWJ/sLb5mFggyqWBOB80lv:ufiL4AYcp/EQzfXMeBdwsW1s3Mgfq+O6

Score
8/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Unexpected DNS network traffic destination 8 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\c3a0da9d5e55ec45df45593074d83aefb3935aaa5ea3b1a75adc6aedb85b9b40.exe
      "C:\Users\Admin\AppData\Local\Temp\c3a0da9d5e55ec45df45593074d83aefb3935aaa5ea3b1a75adc6aedb85b9b40.exe"
      2⤵
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2424-134-0x0000000001260000-0x0000000001268000-memory.dmp

    Filesize

    32KB

  • memory/3924-132-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3924-133-0x0000000000781000-0x00000000007A4000-memory.dmp

    Filesize

    140KB

  • memory/3924-135-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3924-136-0x0000000000781000-0x00000000007A4000-memory.dmp

    Filesize

    140KB