Analysis

  • max time kernel
    151s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 18:18

General

  • Target

    cc9a497760173c1e0569ea5bb2a8e07ee0a2a5b6a6f38f17e548a1ac4d8b9f1a.exe

  • Size

    254KB

  • MD5

    b189212a1cb470b0bbe2a5105bdd1603

  • SHA1

    48698e65b35bd96173e48dff13db0201aeb3480f

  • SHA256

    cc9a497760173c1e0569ea5bb2a8e07ee0a2a5b6a6f38f17e548a1ac4d8b9f1a

  • SHA512

    f9c5ab33116191e8cbeeef9fee22f154364619b653a1090dfc95d5b9190c44708520f35b83e92c99a12a44c15fb3b31f6aa92ccd16803b4541df8c6b5325b75a

  • SSDEEP

    6144:3bHes8pOqqFoWuL++erhpA4AxruqwvbGa+mczqFxt:3bHHwOFLuC+4pALxuvbb+mczq1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9a497760173c1e0569ea5bb2a8e07ee0a2a5b6a6f38f17e548a1ac4d8b9f1a.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9a497760173c1e0569ea5bb2a8e07ee0a2a5b6a6f38f17e548a1ac4d8b9f1a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4580-132-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB

  • memory/4580-133-0x0000000000790000-0x00000000007F4000-memory.dmp

    Filesize

    400KB

  • memory/4580-134-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB

  • memory/4580-135-0x0000000000790000-0x00000000007F4000-memory.dmp

    Filesize

    400KB

  • memory/4580-136-0x00000000022B0000-0x0000000002362000-memory.dmp

    Filesize

    712KB

  • memory/4580-137-0x00000000025B0000-0x0000000002668000-memory.dmp

    Filesize

    736KB