Analysis

  • max time kernel
    77s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 01:46

General

  • Target

    c18a8b004985d5ca037d617a7d748d53.exe

  • Size

    979KB

  • MD5

    c18a8b004985d5ca037d617a7d748d53

  • SHA1

    b69fb7cc4b31378bfb8b0669306c1ee83994e621

  • SHA256

    becec89fd8430b6297a3e99b91f3de54bf8eeae030012587ad98c1fc18ea2cd8

  • SHA512

    515815e08091878c563f72c7a8d1fa59bccbc3aaf8c3ce4d1da144b692cac6d8331aa6b0b6edd1e3848f3e3cac1385e2d92c78fd8c7ec5f8da4a00883e933da1

  • SSDEEP

    24576:mQUxCyoSwn6q4ppeU5/K078TwNwFhGov2wMyhVN9LNa:mBxC+wnJ4pEU0078TwNwFhHBVbE

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c18a8b004985d5ca037d617a7d748d53.exe
    "C:\Users\Admin\AppData\Local\Temp\c18a8b004985d5ca037d617a7d748d53.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1608-133-0x0000000000010000-0x000000000010C000-memory.dmp

    Filesize

    1008KB

  • memory/1608-134-0x00000000075B0000-0x0000000007B54000-memory.dmp

    Filesize

    5.6MB

  • memory/1608-135-0x00000000070E0000-0x0000000007172000-memory.dmp

    Filesize

    584KB

  • memory/1608-136-0x00000000070C0000-0x00000000070CA000-memory.dmp

    Filesize

    40KB

  • memory/1608-137-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1608-138-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1608-142-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1608-143-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB