Analysis

  • max time kernel
    242s
  • max time network
    333s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 08:54

General

  • Target

    afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6.exe

  • Size

    150KB

  • MD5

    3a1360f2779eeb5dbbe6ebfcb555010d

  • SHA1

    0253ade1d727d2934046c42269ebf9057a940158

  • SHA256

    afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

  • SHA512

    7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

  • SSDEEP

    3072:jw9fuuSnpWt6TyNLaQWoU82IZOo6EwBjq:jw9AnQ6T4JhTZOoz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6.exe
    "C:\Users\Admin\AppData\Local\Temp\afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6.exe
      "C:\Users\Admin\AppData\Local\Temp\afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Users\Admin\AppData\Roaming\Cxdkdm.exe
        "C:\Users\Admin\AppData\Roaming\Cxdkdm.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Users\Admin\AppData\Roaming\Cxdkdm.exe
          "C:\Users\Admin\AppData\Roaming\Cxdkdm.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1428

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Cxdkdm.exe

          Filesize

          150KB

          MD5

          3a1360f2779eeb5dbbe6ebfcb555010d

          SHA1

          0253ade1d727d2934046c42269ebf9057a940158

          SHA256

          afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

          SHA512

          7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

        • C:\Users\Admin\AppData\Roaming\Cxdkdm.exe

          Filesize

          150KB

          MD5

          3a1360f2779eeb5dbbe6ebfcb555010d

          SHA1

          0253ade1d727d2934046c42269ebf9057a940158

          SHA256

          afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

          SHA512

          7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

        • C:\Users\Admin\AppData\Roaming\Cxdkdm.exe

          Filesize

          150KB

          MD5

          3a1360f2779eeb5dbbe6ebfcb555010d

          SHA1

          0253ade1d727d2934046c42269ebf9057a940158

          SHA256

          afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

          SHA512

          7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

        • \Users\Admin\AppData\Roaming\Cxdkdm.exe

          Filesize

          150KB

          MD5

          3a1360f2779eeb5dbbe6ebfcb555010d

          SHA1

          0253ade1d727d2934046c42269ebf9057a940158

          SHA256

          afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

          SHA512

          7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

        • \Users\Admin\AppData\Roaming\Cxdkdm.exe

          Filesize

          150KB

          MD5

          3a1360f2779eeb5dbbe6ebfcb555010d

          SHA1

          0253ade1d727d2934046c42269ebf9057a940158

          SHA256

          afc0f365ac622d85f00dcc5ca734f78f384a15ed4d25cf7029c4341af535c1f6

          SHA512

          7e007831e29c5535d84a68bb758cf4ba3c932c121ac1f6ed5d6b2111523123afbfc3eafa41cd85bd09c4a4e56f80b59931065c875d8cbf98e46bca2a433f7b63

        • memory/1316-67-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-55-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-66-0x0000000075531000-0x0000000075533000-memory.dmp

          Filesize

          8KB

        • memory/1316-54-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-68-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-63-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-61-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-59-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1316-57-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1428-89-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1428-90-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB