Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2023 16:50

General

  • Target

    shipping document.exe

  • Size

    694KB

  • MD5

    e93972baf88a612125f843a2d036df02

  • SHA1

    372954e625babd330a82e226adb5c19e8eeb9640

  • SHA256

    60839f78201096dac45fcff102f5c7eb8682b7eb1b36c12b9b997ee41c7d0ced

  • SHA512

    b857e3d9957b0b7dde7b185240f8454e85b3c9a165cb8be22f159e2975451ae7f8339e27d7cc1d2a039d214eda683e9dd69d36bf0b1b7b7af17e04b189f7c016

  • SSDEEP

    12288:85U+vIg5vP0FBWRHitHdInp44B9L+DCJITkcONusHvm4yz:85nvIDoCt9InpTPzS4cIPm

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\shipping document.exe
      "C:\Users\Admin\AppData\Local\Temp\shipping document.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4568
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4848
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4848 -s 188
            4⤵
            • Program crash
            PID:2204
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 460 -p 4848 -ip 4848
      1⤵
        PID:2040

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1684-141-0x0000000000000000-mapping.dmp

      • memory/1684-146-0x00000000015D0000-0x000000000165F000-memory.dmp

        Filesize

        572KB

      • memory/1684-145-0x0000000001000000-0x000000000102D000-memory.dmp

        Filesize

        180KB

      • memory/1684-144-0x0000000001790000-0x0000000001ADA000-memory.dmp

        Filesize

        3.3MB

      • memory/1684-143-0x0000000000040000-0x000000000004B000-memory.dmp

        Filesize

        44KB

      • memory/2152-140-0x0000000007B30000-0x0000000007C00000-memory.dmp

        Filesize

        832KB

      • memory/2152-147-0x0000000007CB0000-0x0000000007D6D000-memory.dmp

        Filesize

        756KB

      • memory/2152-148-0x0000000007CB0000-0x0000000007D6D000-memory.dmp

        Filesize

        756KB

      • memory/4568-138-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4568-139-0x0000000001180000-0x0000000001190000-memory.dmp

        Filesize

        64KB

      • memory/4568-137-0x00000000016F0000-0x0000000001A3A000-memory.dmp

        Filesize

        3.3MB

      • memory/4568-142-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4568-136-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4568-134-0x00000000004012E0-mapping.dmp

      • memory/4568-133-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/5096-132-0x0000017B78270000-0x0000017B78320000-memory.dmp

        Filesize

        704KB

      • memory/5096-135-0x00007FFF3CBB0000-0x00007FFF3D671000-memory.dmp

        Filesize

        10.8MB