Analysis

  • max time kernel
    88s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 12:21

General

  • Target

    ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d.exe

  • Size

    748KB

  • MD5

    25379c62de2d13ec20a1a52528bca4d3

  • SHA1

    48dce85d061cc727c68548b037e9cb58ff731e82

  • SHA256

    ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d

  • SHA512

    347b6f39ccf65ae3472d3fd7431c3176e3dd03d80bb30f8556e8097c7c76c537184c8a81dc5e86526f2980470b675302e3f8aab48d05b30fa14e6f3a45b07654

  • SSDEEP

    12288:GjcTg+WwJA8qUJqRl7k86fpgBDDJrS7LE9HTFIUYVRSs5K4aOEVh:GjcTDWGRJS7kF6lDJqLGT4RSsk4sVh

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d.exe
    "C:\Users\Admin\AppData\Local\Temp\ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\AppData\Local\Temp\ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d.exe
      "C:\Users\Admin\AppData\Local\Temp\ea779514e276f60c11685d2d306a10dfa92da35b8aa1ab2f7c0aa4eaf1c7f43d.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops file in Drivers directory
      • Checks BIOS information in registry
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-132-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1340-459-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-146-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-153-0x0000000000408000-0x0000000000409000-memory.dmp

    Filesize

    4KB

  • memory/1844-142-0x0000000002681000-0x00000000026EF000-memory.dmp

    Filesize

    440KB

  • memory/1844-143-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-144-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-145-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-137-0x0000000002680000-0x0000000002715000-memory.dmp

    Filesize

    596KB

  • memory/1844-136-0x0000000000400000-0x00000000004FD000-memory.dmp

    Filesize

    1012KB

  • memory/1844-155-0x0000000000405000-0x0000000000406000-memory.dmp

    Filesize

    4KB

  • memory/1844-157-0x0000000000404000-0x0000000000405000-memory.dmp

    Filesize

    4KB

  • memory/1844-159-0x0000000000407000-0x0000000000408000-memory.dmp

    Filesize

    4KB

  • memory/1844-161-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/1844-171-0x0000000000406000-0x0000000000407000-memory.dmp

    Filesize

    4KB

  • memory/1844-165-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1844-163-0x0000000000403000-0x0000000000404000-memory.dmp

    Filesize

    4KB

  • memory/1844-134-0x0000000000000000-mapping.dmp