Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 05:51

General

  • Target

    f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe

  • Size

    208KB

  • MD5

    d8e0bd15e2bbcb5aadb7ae81f682d7df

  • SHA1

    098a9b774d90a0572cbf26985ff8a5e5ebd7dd2c

  • SHA256

    f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4

  • SHA512

    6ce8c8699c1afd4b59cafb11e92ba02971a490859c4308c835f17bc8253d52de2e385357580e4c05958f84628b559277e899dc87e42626bf0a62c157c5ad653d

  • SSDEEP

    3072:WDPrP0+IfBxULK6ur4AKKV6AopNgyci0phK0jnboVDcu38Xi+1ffsvaspDZc:gz0+uAKz4AKKSYg0jU9cOI3hA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe
    "C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1268

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\apppatch\svchost.exe

          Filesize

          208KB

          MD5

          df82fda496430fc3f5c7d41a8ec550e8

          SHA1

          e2ad2fedb9ee99045b4ea34f24bf389dae180378

          SHA256

          12953ffce395e3d83f30a76fc18ab8a0582ecb236f9a7a4f788b779882d5a94e

          SHA512

          8bd9de964c3ef52f7e2c712145b5b24e8c1dfeec53e71e41fdb990179ce771a823af559c15b5f64f9737bdade7c033c5d336217072e12237f011291fe1b3df5e

        • C:\Windows\apppatch\svchost.exe

          Filesize

          208KB

          MD5

          df82fda496430fc3f5c7d41a8ec550e8

          SHA1

          e2ad2fedb9ee99045b4ea34f24bf389dae180378

          SHA256

          12953ffce395e3d83f30a76fc18ab8a0582ecb236f9a7a4f788b779882d5a94e

          SHA512

          8bd9de964c3ef52f7e2c712145b5b24e8c1dfeec53e71e41fdb990179ce771a823af559c15b5f64f9737bdade7c033c5d336217072e12237f011291fe1b3df5e

        • memory/1056-132-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/1056-133-0x00000000021E0000-0x0000000002232000-memory.dmp

          Filesize

          328KB

        • memory/1056-139-0x00000000021E0000-0x0000000002232000-memory.dmp

          Filesize

          328KB

        • memory/1056-138-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/1268-137-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/1268-140-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB

        • memory/1268-141-0x00000000029A0000-0x0000000002A4A000-memory.dmp

          Filesize

          680KB

        • memory/1268-142-0x0000000002B90000-0x0000000002C47000-memory.dmp

          Filesize

          732KB