Analysis

  • max time kernel
    80s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 16:55

General

  • Target

    0x000600000001ace8-206.exe

  • Size

    7.1MB

  • MD5

    0770b122545119afb2c4e87a2b6732ef

  • SHA1

    d644fb9b8fead525dae31c75ad58afff3d90e33d

  • SHA256

    6b2b4ba436ffb3f5cb5872a1c590c8504a26a2d003cb872313fc722222ea6cc6

  • SHA512

    fd1660b22b04656f9b87dccf1b130da356557aacca34ef19472a4a79ac28330ff2b55427f7062c32a71e642417e2eb64d2edced80c48d0d4001c0905b1d3ae37

  • SSDEEP

    196608:TwH8E5+Itu+2TzWI1CSfMqvCQoQvySRBJ:TwcQ+egoWv9vySRT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000600000001ace8-206.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000600000001ace8-206.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4996
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 460 -p 4712 -ip 4712
    1⤵
      PID:4908
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4712 -s 836
      1⤵
      • Program crash
      PID:4920
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4768
      • C:\Users\Admin\Desktop\0x000600000001ace8-206.exe
        "C:\Users\Admin\Desktop\0x000600000001ace8-206.exe"
        1⤵
        • Loads dropped DLL
        PID:2876

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\dc1a346e22544b9a88c270d74454b40c\WebView2Loader.dll

              Filesize

              107KB

              MD5

              0fc6f5b0b3babdf352024844d2a756d5

              SHA1

              1b58e7c0ff1d1cd83d9aed80c8d75d8bc2b163e8

              SHA256

              77a2a3097c0af6e884d2f7643dfe38094453309dd2433c33730fca10a0477411

              SHA512

              81942fe24fdb0977ffc4e19046af49cdb3cfd4660d75a4e8f5a5db399275c9641a2615bf01c94b74fed044730144b0969160a2eaccf274ee4aae6c595e5abe15

            • C:\Users\Admin\AppData\Local\Temp\dc1a346e22544b9a88c270d74454b40c\WebView2Loader.dll

              Filesize

              107KB

              MD5

              0fc6f5b0b3babdf352024844d2a756d5

              SHA1

              1b58e7c0ff1d1cd83d9aed80c8d75d8bc2b163e8

              SHA256

              77a2a3097c0af6e884d2f7643dfe38094453309dd2433c33730fca10a0477411

              SHA512

              81942fe24fdb0977ffc4e19046af49cdb3cfd4660d75a4e8f5a5db399275c9641a2615bf01c94b74fed044730144b0969160a2eaccf274ee4aae6c595e5abe15

            • memory/4996-132-0x0000000000B60000-0x0000000001274000-memory.dmp

              Filesize

              7.1MB

            • memory/4996-134-0x000000000AB40000-0x000000000AB48000-memory.dmp

              Filesize

              32KB

            • memory/4996-135-0x000000000C830000-0x000000000C868000-memory.dmp

              Filesize

              224KB

            • memory/4996-136-0x000000000C810000-0x000000000C81E000-memory.dmp

              Filesize

              56KB