Analysis

  • max time kernel
    54s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/06/2023, 22:50 UTC

General

  • Target

    5f50eca886390346c53df179ff22b4ee7e7898eb85f193ec19c940bd6cf593f8.exe

  • Size

    121KB

  • MD5

    7f06da627e908da3270c5d75d0344160

  • SHA1

    a12df7cddeb6e17b086575a5354ddb3293b9d5c0

  • SHA256

    5f50eca886390346c53df179ff22b4ee7e7898eb85f193ec19c940bd6cf593f8

  • SHA512

    5bdecee4256d456f414f74293c3f8cef7de49c723c33cc0bb0f4dc9704fe5d6a29904a65b047f3ca9b227574bdb06bcdfac043975c056c1041ec9d148a4364dc

  • SSDEEP

    3072:L9QLdsON8xxwaTq29Li+scTLfWvF8oyhuWVFrag1shb4rtvx:5QLvN8VTXsciWVFmZhcrt

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f50eca886390346c53df179ff22b4ee7e7898eb85f193ec19c940bd6cf593f8.exe
    "C:\Users\Admin\AppData\Local\Temp\5f50eca886390346c53df179ff22b4ee7e7898eb85f193ec19c940bd6cf593f8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2588
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 140
      2⤵
      • Program crash
      PID:4044

Network

  • flag-us
    DNS
    52.4.107.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    52.4.107.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    63.13.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    63.13.109.52.in-addr.arpa
    IN PTR
    Response
  • 51.105.71.136:443
    322 B
    7
  • 8.8.8.8:53
    52.4.107.13.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    52.4.107.13.in-addr.arpa

  • 8.8.8.8:53
    63.13.109.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    63.13.109.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2588-121-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.