Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2023, 07:36

General

  • Target

    d27b20602db59697c20293d02aef1e433f98baf4.exe

  • Size

    1.2MB

  • MD5

    9190513275b80db066cc1a2275c01af1

  • SHA1

    d27b20602db59697c20293d02aef1e433f98baf4

  • SHA256

    36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00

  • SHA512

    c425f57e05af494687b7b7d81252a5345d61554860a41d398346b5ca31fa229003c3ff0d570749d2eec146f142e701725724e279110c77df52ae7b4e6524f2dc

  • SSDEEP

    12288:3Cw0bu5zZm+Sxkxm/X7hddTg1k8WtEGPObozGVzrj2roUVxAvWkZxsqJyMkZ6yEe:3ClP78fLPTu69tCT/4jwCv

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe
      "C:\Users\Admin\AppData\Local\Temp\d27b20602db59697c20293d02aef1e433f98baf4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
        3⤵
          PID:3924
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
          3⤵
            PID:4636
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:3332
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
              3⤵
                PID:3776
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
                3⤵
                  PID:2900
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                  3⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:728
              • C:\Windows\SysWOW64\msdt.exe
                "C:\Windows\SysWOW64\msdt.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2112
                • C:\Program Files\Mozilla Firefox\Firefox.exe
                  "C:\Program Files\Mozilla Firefox\Firefox.exe"
                  3⤵
                    PID:4888

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/728-138-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/728-140-0x0000000000C80000-0x0000000000C90000-memory.dmp

                Filesize

                64KB

              • memory/728-134-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/728-139-0x0000000001210000-0x000000000155A000-memory.dmp

                Filesize

                3.3MB

              • memory/728-137-0x0000000000400000-0x000000000042F000-memory.dmp

                Filesize

                188KB

              • memory/1296-136-0x00007FFEA5C90000-0x00007FFEA6751000-memory.dmp

                Filesize

                10.8MB

              • memory/1296-132-0x00000275CE000000-0x00000275CE138000-memory.dmp

                Filesize

                1.2MB

              • memory/1296-133-0x00007FFEA5C90000-0x00007FFEA6751000-memory.dmp

                Filesize

                10.8MB

              • memory/2112-143-0x0000000000190000-0x00000000001E7000-memory.dmp

                Filesize

                348KB

              • memory/2112-144-0x0000000001100000-0x000000000112D000-memory.dmp

                Filesize

                180KB

              • memory/2112-145-0x0000000003150000-0x000000000349A000-memory.dmp

                Filesize

                3.3MB

              • memory/2112-146-0x0000000002EF0000-0x0000000002F7F000-memory.dmp

                Filesize

                572KB

              • memory/2112-148-0x0000000001100000-0x000000000112D000-memory.dmp

                Filesize

                180KB

              • memory/2424-141-0x0000000008A80000-0x0000000008B77000-memory.dmp

                Filesize

                988KB

              • memory/2424-147-0x0000000008900000-0x00000000089BE000-memory.dmp

                Filesize

                760KB

              • memory/2424-149-0x0000000008900000-0x00000000089BE000-memory.dmp

                Filesize

                760KB