Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2023, 14:02

General

  • Target

    Web.exe

  • Size

    18.5MB

  • MD5

    5af1702ff5ee44029bb0bd6e59958a84

  • SHA1

    e11a41820fe606be15f5e4b43eeb435ec4c516ad

  • SHA256

    001ee1520dc5813d58754d79982d177f12603f88affe9d9e6be85868e6887510

  • SHA512

    80220f7f1b1c1a44cd1dcad87b50a64524510dfeca3c714eb53a23aa4f2825202f5f113fe217237870a66ab7486c3efa4e9af4217cc7eb59a0593905f51e0de1

  • SSDEEP

    393216:diats5esGrj8BVZdA/Q/4tdUMayfn4IjOuTExmctUbtK:dB365Ao/E6Mnj5TFctUJ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Web.exe
    "C:\Users\Admin\AppData\Local\Temp\Web.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2724
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4984
    • C:\Users\Admin\AppData\Local\Temp\Web.exe
      "C:\Users\Admin\AppData\Local\Temp\Web.exe"
      1⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2724-133-0x0000000000730000-0x0000000000731000-memory.dmp

      Filesize

      4KB

    • memory/2724-134-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/2724-135-0x0000000000750000-0x0000000000751000-memory.dmp

      Filesize

      4KB

    • memory/2724-136-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/2724-137-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/2724-138-0x0000000000B90000-0x0000000000B91000-memory.dmp

      Filesize

      4KB

    • memory/2724-139-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

      Filesize

      4KB

    • memory/2724-140-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

      Filesize

      4KB

    • memory/2724-141-0x0000000000C90000-0x0000000004345000-memory.dmp

      Filesize

      54.7MB

    • memory/2724-143-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/2724-145-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/2884-146-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/2884-147-0x0000000000C00000-0x0000000000C01000-memory.dmp

      Filesize

      4KB

    • memory/2884-148-0x0000000000C10000-0x0000000000C11000-memory.dmp

      Filesize

      4KB

    • memory/2884-149-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/2884-151-0x0000000000C50000-0x0000000000C51000-memory.dmp

      Filesize

      4KB

    • memory/2884-150-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/2884-152-0x0000000000C70000-0x0000000000C71000-memory.dmp

      Filesize

      4KB

    • memory/2884-153-0x0000000000C80000-0x0000000000C81000-memory.dmp

      Filesize

      4KB

    • memory/2884-154-0x0000000000C90000-0x0000000004345000-memory.dmp

      Filesize

      54.7MB

    • memory/2884-156-0x0000000005C50000-0x0000000005C51000-memory.dmp

      Filesize

      4KB