Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 14:39

General

  • Target

    ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d.exe

  • Size

    148KB

  • MD5

    f5347a592713c95a431b3da91f0f11e3

  • SHA1

    f8f2fda70f502176494578a93ae445fab4533d26

  • SHA256

    ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d

  • SHA512

    40eee3a41020e488c8ab40914fe994bace04d0948f84217c0626f1ce6b4804cd8466c0e4f438f23361e1d22975e57af18cfb2ec076c5a11d6040760bb77ffb17

  • SSDEEP

    3072:v7o5pvCZkc9fS1UgsHFEqJKyUsxLlaSQlQa5zzq:v7ovCR9a1UgMEqJGn9QaQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d.exe
    "C:\Users\Admin\AppData\Local\Temp\ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d.exe
      C:\Users\Admin\AppData\Local\Temp\ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d.exe
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Users\Admin\AppData\Roaming\Rwwtwk.exe
        "C:\Users\Admin\AppData\Roaming\Rwwtwk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Users\Admin\AppData\Roaming\Rwwtwk.exe
          C:\Users\Admin\AppData\Roaming\Rwwtwk.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4700
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2952
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:17410 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    228d25dd7d377af29848012a2b059814

    SHA1

    a29a3c1e167f3581b0aa4be90b1769a89beab01c

    SHA256

    9d4e26398806093c8af5a60e646afb3c2fc110ea0dc93821e29dc48da62280bb

    SHA512

    1d004bb21f7225fe220aae71d7836c0f5b2e58cb855209e2cc7f1a903ae73b67c408f59108b31faf7caed420758f4753b476c927299da5d607304b5d3a45bc61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    9e5a88bcae1042a9148722323d9988df

    SHA1

    46fb73c398598864d2644c8cef87f8cb73c2c696

    SHA256

    9702e679582a79aa7ffc3e86bee9d25598eace564ced9711143727e162e8574f

    SHA512

    71c2241393edcba4e2a034a7e5e7da7b1fea6b4b75edad09993ba216868d1b7045de8e9ff9141392e97909cbbeaf2e8b2ab8c6ababf503fb32352b35311436cb

  • C:\Users\Admin\AppData\Roaming\Rwwtwk.exe

    Filesize

    148KB

    MD5

    f5347a592713c95a431b3da91f0f11e3

    SHA1

    f8f2fda70f502176494578a93ae445fab4533d26

    SHA256

    ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d

    SHA512

    40eee3a41020e488c8ab40914fe994bace04d0948f84217c0626f1ce6b4804cd8466c0e4f438f23361e1d22975e57af18cfb2ec076c5a11d6040760bb77ffb17

  • C:\Users\Admin\AppData\Roaming\Rwwtwk.exe

    Filesize

    148KB

    MD5

    f5347a592713c95a431b3da91f0f11e3

    SHA1

    f8f2fda70f502176494578a93ae445fab4533d26

    SHA256

    ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d

    SHA512

    40eee3a41020e488c8ab40914fe994bace04d0948f84217c0626f1ce6b4804cd8466c0e4f438f23361e1d22975e57af18cfb2ec076c5a11d6040760bb77ffb17

  • C:\Users\Admin\AppData\Roaming\Rwwtwk.exe

    Filesize

    148KB

    MD5

    f5347a592713c95a431b3da91f0f11e3

    SHA1

    f8f2fda70f502176494578a93ae445fab4533d26

    SHA256

    ba404633fb680896cb7e31a8687dc680934f8c8f0fd20a88422abb51edd4b46d

    SHA512

    40eee3a41020e488c8ab40914fe994bace04d0948f84217c0626f1ce6b4804cd8466c0e4f438f23361e1d22975e57af18cfb2ec076c5a11d6040760bb77ffb17

  • memory/1964-139-0x0000000000000000-mapping.dmp

  • memory/1964-143-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1964-147-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2320-132-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2320-136-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3192-149-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3192-151-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3192-150-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3192-144-0x0000000000000000-mapping.dmp

  • memory/4492-137-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4492-142-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4492-138-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4492-134-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4492-133-0x0000000000000000-mapping.dmp