Analysis

  • max time kernel
    158s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 23:23

General

  • Target

    d27eace1e368b162641a8f17f7dd76edab10eaf307a3bdba39274137e8985623.exe

  • Size

    100KB

  • MD5

    b172897512a0809dac1232801feffa73

  • SHA1

    6f7bd3ef61a4c445c1d165ce3b4c4979a7616feb

  • SHA256

    d27eace1e368b162641a8f17f7dd76edab10eaf307a3bdba39274137e8985623

  • SHA512

    668b92e596d63f688f2fc9920a8792f68be53d859c15f5b50b8f908e2f377453642d4b61d172918d43f25fdc2affc1fac92daa3cd843f5150fdc461dfeef0909

  • SSDEEP

    1536:EPW8cgzK3zdOryP544AkPSXsWtgh7q4aYYxvWqfgoqHYRIA:ATLkh5qoUVgF3aYY9Wqfgo2Y

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d27eace1e368b162641a8f17f7dd76edab10eaf307a3bdba39274137e8985623.exe
    "C:\Users\Admin\AppData\Local\Temp\d27eace1e368b162641a8f17f7dd76edab10eaf307a3bdba39274137e8985623.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4428
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ea055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4428-132-0x0000000001000000-0x000000000101A000-memory.dmp

    Filesize

    104KB

  • memory/4428-133-0x0000000001000000-0x000000000101A000-memory.dmp

    Filesize

    104KB