Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443.exe
Resource
win10v2004-20230221-en
General
-
Target
5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443.exe
-
Size
653KB
-
MD5
865f5d2c00bf96b95319d42d007bea2a
-
SHA1
b553c2e73d7ab9459e77a00ae5b36b56e13ada22
-
SHA256
5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443
-
SHA512
96242a18d788c3b3c17461fcf7a3b0c8fc11af697a93a6c429e0d92bb8cdb46e27490b446921ad4d3b6061d5d41be50eea8d7381ddd42f1a80afd6f907e3c5ab
-
SSDEEP
12288:g3F4L16JYy/3lTjrN+PU1MQvq8hut0M2niS2SBKXK0NSDw:g3Fa1PcjrNpMYfct0M2nGeWck
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3064 TypeId -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3064 set thread context of 3464 3064 TypeId 91 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1812 5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443.exe Token: SeDebugPrivilege 3064 TypeId Token: SeDebugPrivilege 3464 RegAsm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3464 3064 TypeId 91 PID 3064 wrote to memory of 3464 3064 TypeId 91 PID 3064 wrote to memory of 3464 3064 TypeId 91 PID 3064 wrote to memory of 3464 3064 TypeId 91 PID 3064 wrote to memory of 3464 3064 TypeId 91 PID 3064 wrote to memory of 3464 3064 TypeId 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443.exe"C:\Users\Admin\AppData\Local\Temp\5da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Users\Admin\AppData\Roaming\FileSection\TypeIdC:\Users\Admin\AppData\Roaming\FileSection\TypeId1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD5865f5d2c00bf96b95319d42d007bea2a
SHA1b553c2e73d7ab9459e77a00ae5b36b56e13ada22
SHA2565da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443
SHA51296242a18d788c3b3c17461fcf7a3b0c8fc11af697a93a6c429e0d92bb8cdb46e27490b446921ad4d3b6061d5d41be50eea8d7381ddd42f1a80afd6f907e3c5ab
-
Filesize
653KB
MD5865f5d2c00bf96b95319d42d007bea2a
SHA1b553c2e73d7ab9459e77a00ae5b36b56e13ada22
SHA2565da3df88c52c3ceba281842b431c20d0f35fbcb8739e789fe6fee39bcb0a1443
SHA51296242a18d788c3b3c17461fcf7a3b0c8fc11af697a93a6c429e0d92bb8cdb46e27490b446921ad4d3b6061d5d41be50eea8d7381ddd42f1a80afd6f907e3c5ab