Analysis

  • max time kernel
    87s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 13:16

General

  • Target

    c726a4eba148b17c9ccf3692fbc90701.bin.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
6/10

Malware Config

Signatures

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c726a4eba148b17c9ccf3692fbc90701.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\c726a4eba148b17c9ccf3692fbc90701.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3180-138-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3180-151-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3180-150-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3180-149-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3180-137-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4244-143-0x0000000009040000-0x00000000095E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4244-145-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

    Filesize

    1.8MB

  • memory/4244-140-0x0000000007B10000-0x0000000007B4C000-memory.dmp

    Filesize

    240KB

  • memory/4244-141-0x0000000007E50000-0x0000000007EB6000-memory.dmp

    Filesize

    408KB

  • memory/4244-142-0x00000000089F0000-0x0000000008A82000-memory.dmp

    Filesize

    584KB

  • memory/4244-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4244-144-0x0000000008B90000-0x0000000008C06000-memory.dmp

    Filesize

    472KB

  • memory/4244-139-0x0000000007B00000-0x0000000007B10000-memory.dmp

    Filesize

    64KB

  • memory/4244-146-0x0000000009B20000-0x000000000A04C000-memory.dmp

    Filesize

    5.2MB

  • memory/4244-147-0x0000000008C90000-0x0000000008CAE000-memory.dmp

    Filesize

    120KB

  • memory/4244-148-0x0000000003010000-0x0000000003060000-memory.dmp

    Filesize

    320KB

  • memory/4244-136-0x0000000007BC0000-0x0000000007CCA000-memory.dmp

    Filesize

    1.0MB

  • memory/4244-135-0x0000000007A90000-0x0000000007AA2000-memory.dmp

    Filesize

    72KB

  • memory/4244-134-0x0000000008020000-0x0000000008638000-memory.dmp

    Filesize

    6.1MB

  • memory/4244-152-0x0000000007B00000-0x0000000007B10000-memory.dmp

    Filesize

    64KB