Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2023 05:36

General

  • Target

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
6/10

Malware Config

Signatures

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe
    "C:\Users\Admin\AppData\Local\Temp\9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1076-145-0x0000000008440000-0x00000000084B6000-memory.dmp

    Filesize

    472KB

  • memory/1076-146-0x0000000004830000-0x000000000484E000-memory.dmp

    Filesize

    120KB

  • memory/1076-141-0x0000000007600000-0x0000000007666000-memory.dmp

    Filesize

    408KB

  • memory/1076-137-0x0000000007390000-0x000000000749A000-memory.dmp

    Filesize

    1.0MB

  • memory/1076-142-0x00000000081A0000-0x0000000008232000-memory.dmp

    Filesize

    584KB

  • memory/1076-148-0x000000000A120000-0x000000000A64C000-memory.dmp

    Filesize

    5.2MB

  • memory/1076-139-0x0000000007300000-0x000000000733C000-memory.dmp

    Filesize

    240KB

  • memory/1076-140-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/1076-135-0x0000000007260000-0x0000000007272000-memory.dmp

    Filesize

    72KB

  • memory/1076-151-0x00000000072F0000-0x0000000007300000-memory.dmp

    Filesize

    64KB

  • memory/1076-144-0x0000000008340000-0x0000000008390000-memory.dmp

    Filesize

    320KB

  • memory/1076-143-0x00000000087F0000-0x0000000008D94000-memory.dmp

    Filesize

    5.6MB

  • memory/1076-133-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1076-134-0x00000000077D0000-0x0000000007DE8000-memory.dmp

    Filesize

    6.1MB

  • memory/1076-147-0x0000000009A20000-0x0000000009BE2000-memory.dmp

    Filesize

    1.8MB

  • memory/3068-136-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3068-149-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3068-150-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3068-138-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB