Analysis

  • max time kernel
    111s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 07:53

General

  • Target

    bacd85ea2cce657df3685901094d93639ee2efe7284d484f0612ac92cf856f26.exe

  • Size

    108KB

  • MD5

    e96b41ce209c0f7b2fa1063aa87e2dc2

  • SHA1

    f5e54c9b95c0f70745fb24c4185e58de3433d9a9

  • SHA256

    bacd85ea2cce657df3685901094d93639ee2efe7284d484f0612ac92cf856f26

  • SHA512

    c4e9fab847f63a9ce2ab7255fc2c8627a5f7924ee291fe39d1176075d3c7836fdc870d863036cdcce62930a872750c989c1cbbe75c165af657a11dc35f1a125d

  • SSDEEP

    1536:8Ily2lGtgJmKIY1F4b13WP/4oxllB00p:8Oy2ldQbZWPAoLM0p

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bacd85ea2cce657df3685901094d93639ee2efe7284d484f0612ac92cf856f26.exe
    "C:\Users\Admin\AppData\Local\Temp\bacd85ea2cce657df3685901094d93639ee2efe7284d484f0612ac92cf856f26.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /T /IM toy.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3828
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /T /IM wscript.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4040-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4040-135-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB