Analysis

  • max time kernel
    56s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2023 16:09

General

  • Target

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
6/10

Malware Config

Signatures

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-134-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/1248-125-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/1248-135-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/1248-119-0x0000000006F90000-0x0000000006FBC000-memory.dmp

    Filesize

    176KB

  • memory/1248-123-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/1248-124-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/1248-133-0x0000000007160000-0x0000000007170000-memory.dmp

    Filesize

    64KB

  • memory/4296-126-0x0000000007650000-0x000000000775A000-memory.dmp

    Filesize

    1.0MB

  • memory/4296-120-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4296-131-0x0000000008480000-0x0000000008512000-memory.dmp

    Filesize

    584KB

  • memory/4296-121-0x0000000007AD0000-0x00000000080D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4296-141-0x00000000095D0000-0x0000000009620000-memory.dmp

    Filesize

    320KB

  • memory/4296-128-0x00000000075C0000-0x000000000760B000-memory.dmp

    Filesize

    300KB

  • memory/4296-132-0x0000000008A20000-0x0000000008F1E000-memory.dmp

    Filesize

    5.0MB

  • memory/4296-127-0x0000000007580000-0x00000000075BE000-memory.dmp

    Filesize

    248KB

  • memory/4296-122-0x0000000007520000-0x0000000007532000-memory.dmp

    Filesize

    72KB

  • memory/4296-129-0x00000000078E0000-0x00000000078F0000-memory.dmp

    Filesize

    64KB

  • memory/4296-136-0x00000000078E0000-0x00000000078F0000-memory.dmp

    Filesize

    64KB

  • memory/4296-137-0x00000000086F0000-0x0000000008766000-memory.dmp

    Filesize

    472KB

  • memory/4296-138-0x0000000008F20000-0x00000000090E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4296-139-0x0000000009620000-0x0000000009B4C000-memory.dmp

    Filesize

    5.2MB

  • memory/4296-140-0x00000000087F0000-0x000000000880E000-memory.dmp

    Filesize

    120KB

  • memory/4296-130-0x00000000078F0000-0x0000000007956000-memory.dmp

    Filesize

    408KB