Analysis

  • max time kernel
    109s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2023, 21:49

General

  • Target

    Microsoft Office Cracked.exe

  • Size

    715.3MB

  • MD5

    70c3d7f58bc5a960480117a7609e7d45

  • SHA1

    4d3b7617b99ec1ad0bf86a599daa7e5138d7939a

  • SHA256

    eb22dcbc6620bfbcb4746ae369eef59ba6c49d7f2d5cb87b5f8f12058a6cfa9e

  • SHA512

    238351368341cd63e93a47ea399e6226a6de702f5dddd053dd22e4ba382bb10b3f42d41c55660ce9c3fb8033cd4cba642710e5308840c9968cb106f45aa5ddc1

  • SSDEEP

    98304:+r/fQ+GX+PuArhlhCkBvJqKUIXn0OTLb6QgYbXpAXrN3LMg:+rnQ+4kDh95JjdnPTLb6QgQpaJ7M

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4776
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3916
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
    • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1352

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Microsoft Office Cracked.exe.log

      Filesize

      226B

      MD5

      28d7fcc2b910da5e67ebb99451a5f598

      SHA1

      a5bf77a53eda1208f4f37d09d82da0b9915a6747

      SHA256

      2391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c

      SHA512

      2d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

      Filesize

      2KB

      MD5

      51c4eaf7e24cb6fac3c0055d2a6b38d9

      SHA1

      719c51e2ca9c4a8e8b3f424f516d01205aa1928e

      SHA256

      3e87ea4d3e6dd879e5cd808b1745857774948e2cc457e24de850a5ca5f3d8a5b

      SHA512

      171119f9a703b65e26b89ae0f6e90324641b68dd7db2c1c64b3eba442fa1714d5ab992768e864107951cc1e495fd7815758dd1964397faeeb43b816240ee58d9

    • memory/456-153-0x00007FFB7D360000-0x00007FFB7DE21000-memory.dmp

      Filesize

      10.8MB

    • memory/3640-157-0x00007FFB7D360000-0x00007FFB7DE21000-memory.dmp

      Filesize

      10.8MB

    • memory/3640-154-0x00007FFB7D360000-0x00007FFB7DE21000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-148-0x00007FFB80490000-0x00007FFB80F51000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-135-0x00007FFB80490000-0x00007FFB80F51000-memory.dmp

      Filesize

      10.8MB

    • memory/3668-132-0x000001DBCBCC0000-0x000001DBCCAD0000-memory.dmp

      Filesize

      14.1MB

    • memory/4776-138-0x0000000005370000-0x000000000547A000-memory.dmp

      Filesize

      1.0MB

    • memory/4776-141-0x0000000006200000-0x0000000006292000-memory.dmp

      Filesize

      584KB

    • memory/4776-144-0x00000000062A0000-0x00000000062BE000-memory.dmp

      Filesize

      120KB

    • memory/4776-145-0x0000000006E00000-0x0000000006FC2000-memory.dmp

      Filesize

      1.8MB

    • memory/4776-146-0x0000000007500000-0x0000000007A2C000-memory.dmp

      Filesize

      5.2MB

    • memory/4776-147-0x00000000067E0000-0x0000000006830000-memory.dmp

      Filesize

      320KB

    • memory/4776-142-0x0000000006850000-0x0000000006DF4000-memory.dmp

      Filesize

      5.6MB

    • memory/4776-143-0x00000000064A0000-0x0000000006516000-memory.dmp

      Filesize

      472KB

    • memory/4776-140-0x0000000005600000-0x0000000005666000-memory.dmp

      Filesize

      408KB

    • memory/4776-139-0x00000000052A0000-0x00000000052DC000-memory.dmp

      Filesize

      240KB

    • memory/4776-137-0x0000000005240000-0x0000000005252000-memory.dmp

      Filesize

      72KB

    • memory/4776-136-0x0000000005840000-0x0000000005E58000-memory.dmp

      Filesize

      6.1MB

    • memory/4776-133-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB