Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 09:38

General

  • Target

    8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe

  • Size

    36KB

  • MD5

    030ec19b8d7c22d8802686029f2f35a0

  • SHA1

    c367e3fdf3a3cad3bc04d054464b0c42c708ff45

  • SHA256

    8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df

  • SHA512

    7e86566120740f44dc96df6700eb13104b00e57a21dcf25a147ebf072ba1b51555a30ff2a2c3d171e93742116822f1cf82038dea665c0728bd75e38ce3441fb4

  • SSDEEP

    768:HImtTP8eJe99c1GxaPno68KDbZSRnLyH5UmZ:oyTPHJe99c6eocZwnLyH5

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe
    "C:\Users\Admin\AppData\Local\Temp\8d6f0e471fd0e0de54a7b1d2f19db7c83504dcebdb81a7403eadf3e2e23541df.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2016
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    PID:1532
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
    1⤵
      PID:3680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads