Analysis

  • max time kernel
    54s
  • max time network
    183s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/04/2023, 22:17

General

  • Target

    a18e76c926dec48e7d95fa22a812c9defc3429b58b42635f2cd08c1f3effb956.exe

  • Size

    1.5MB

  • MD5

    6d2018ce5b335defe717c2952a7a96dd

  • SHA1

    d0f15b88859f15981503130d828b83ed96dc6674

  • SHA256

    a18e76c926dec48e7d95fa22a812c9defc3429b58b42635f2cd08c1f3effb956

  • SHA512

    91ca389550d16e3aabf2aa49fdec555119075ee319a7e96cab3c7936e87406e12bb1653febfef682a78a7b61a3ef8b9c8428201e65c53f1d5f2f2eb4c4cac463

  • SSDEEP

    24576:gfc/0Lg7mxnep+uE38J/eeMAAIQrypUW:T05RmrAOyW

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18e76c926dec48e7d95fa22a812c9defc3429b58b42635f2cd08c1f3effb956.exe
    "C:\Users\Admin\AppData\Local\Temp\a18e76c926dec48e7d95fa22a812c9defc3429b58b42635f2cd08c1f3effb956.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:3592
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
        2⤵
          PID:992
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
          2⤵
            PID:2260
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
            2⤵
              PID:2348
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
              2⤵
                PID:2368
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
                2⤵
                  PID:5100
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                  2⤵
                    PID:4420
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
                    2⤵
                      PID:4436
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
                      2⤵
                        PID:4496
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
                        2⤵
                          PID:5108
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
                          2⤵
                            PID:5116
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                            2⤵
                              PID:4220
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
                              2⤵
                                PID:4816
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4840

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/4148-116-0x000001E424290000-0x000001E424410000-memory.dmp

                              Filesize

                              1.5MB

                            • memory/4148-117-0x000001E43E8C0000-0x000001E43E936000-memory.dmp

                              Filesize

                              472KB

                            • memory/4148-118-0x000001E4247B0000-0x000001E424832000-memory.dmp

                              Filesize

                              520KB

                            • memory/4148-119-0x000001E4260C0000-0x000001E4260DE000-memory.dmp

                              Filesize

                              120KB

                            • memory/4148-120-0x000001E43EA40000-0x000001E43EA50000-memory.dmp

                              Filesize

                              64KB

                            • memory/4840-121-0x0000000000400000-0x0000000000442000-memory.dmp

                              Filesize

                              264KB

                            • memory/4840-123-0x00000000077B0000-0x0000000007DB6000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/4840-124-0x00000000071D0000-0x00000000071E2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4840-125-0x0000000007300000-0x000000000740A000-memory.dmp

                              Filesize

                              1.0MB

                            • memory/4840-126-0x0000000007230000-0x000000000726E000-memory.dmp

                              Filesize

                              248KB

                            • memory/4840-127-0x00000000075F0000-0x0000000007600000-memory.dmp

                              Filesize

                              64KB

                            • memory/4840-128-0x0000000007270000-0x00000000072BB000-memory.dmp

                              Filesize

                              300KB

                            • memory/4840-129-0x0000000007580000-0x00000000075E6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4840-130-0x0000000008850000-0x00000000088E2000-memory.dmp

                              Filesize

                              584KB

                            • memory/4840-131-0x0000000008DF0000-0x00000000092EE000-memory.dmp

                              Filesize

                              5.0MB

                            • memory/4840-132-0x0000000008980000-0x00000000089D0000-memory.dmp

                              Filesize

                              320KB

                            • memory/4840-133-0x0000000008D60000-0x0000000008DD6000-memory.dmp

                              Filesize

                              472KB

                            • memory/4840-134-0x0000000009F70000-0x000000000A132000-memory.dmp

                              Filesize

                              1.8MB

                            • memory/4840-135-0x000000000A670000-0x000000000AB9C000-memory.dmp

                              Filesize

                              5.2MB

                            • memory/4840-136-0x0000000009E70000-0x0000000009E8E000-memory.dmp

                              Filesize

                              120KB