Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2023 10:23

General

  • Target

    SvCpJuhbT.exe

  • Size

    1.7MB

  • MD5

    c726a4eba148b17c9ccf3692fbc90701

  • SHA1

    52d203ff30f7a23fdc4cb45caa2efa40324a43d9

  • SHA256

    9eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6

  • SHA512

    8499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e

  • SSDEEP

    49152:rbwfYXOdg8BnGyKkv6dfaAHYgDJY2Zuqz1:rs7sf

Score
6/10

Malware Config

Signatures

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SvCpJuhbT.exe
    "C:\Users\Admin\AppData\Local\Temp\SvCpJuhbT.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\SysWOW64\notepad.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe
        "C:\Windows\Microsoft.NET\assembly\GAC_32\MSBuild\v4.0_4.0.0.0__b03f5f7f11d50a3a\MSBuild.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-143-0x0000000008E00000-0x00000000093A4000-memory.dmp

    Filesize

    5.6MB

  • memory/368-146-0x0000000008A50000-0x0000000008AC6000-memory.dmp

    Filesize

    472KB

  • memory/368-141-0x0000000007A60000-0x0000000007A70000-memory.dmp

    Filesize

    64KB

  • memory/368-136-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/368-137-0x0000000007FF0000-0x0000000008608000-memory.dmp

    Filesize

    6.1MB

  • memory/368-138-0x0000000001790000-0x00000000017A2000-memory.dmp

    Filesize

    72KB

  • memory/368-139-0x0000000007AE0000-0x0000000007BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/368-142-0x0000000007D50000-0x0000000007DB6000-memory.dmp

    Filesize

    408KB

  • memory/368-149-0x0000000008BC0000-0x0000000008BDE000-memory.dmp

    Filesize

    120KB

  • memory/368-148-0x0000000009AB0000-0x0000000009FDC000-memory.dmp

    Filesize

    5.2MB

  • memory/368-140-0x0000000007A10000-0x0000000007A4C000-memory.dmp

    Filesize

    240KB

  • memory/368-144-0x0000000008930000-0x00000000089C2000-memory.dmp

    Filesize

    584KB

  • memory/368-145-0x00000000088E0000-0x0000000008930000-memory.dmp

    Filesize

    320KB

  • memory/368-147-0x00000000093B0000-0x0000000009572000-memory.dmp

    Filesize

    1.8MB

  • memory/1204-134-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/1204-151-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/1204-153-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/1204-133-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/1204-152-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB

  • memory/1204-135-0x0000000004750000-0x0000000004760000-memory.dmp

    Filesize

    64KB