Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 05:26
Static task
static1
Behavioral task
behavioral1
Sample
f0f5e6f32198fa1837b3090b7fd71fbb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f0f5e6f32198fa1837b3090b7fd71fbb.exe
Resource
win10v2004-20230703-en
General
-
Target
f0f5e6f32198fa1837b3090b7fd71fbb.exe
-
Size
4.1MB
-
MD5
f0f5e6f32198fa1837b3090b7fd71fbb
-
SHA1
bfece5be6f01f5e44b5637c6d733577d8bb64941
-
SHA256
b8cdfada8522638a45efdac45fe27eb60b9860222d2486036e12d4a18688445b
-
SHA512
3af3e8e5ff6cc5dc58859ba3d1f1cc9324d2b41601236749b889f0183f514bbcbe685f62910078db590f795c84fd325656c76ac154485a0a91b26204b4f27acb
-
SSDEEP
6144:sB5f3YwKrMducTng1RxdBNE8ZOoXzeprQoXwg4kVUm+vL1kXwT/vEVelKh:If3zKrMduNndr3zDepGkVwvhHXEV00
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f0f5e6f32198fa1837b3090b7fd71fbb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Software\Microsoft\Windows\CurrentVersion\Run f0f5e6f32198fa1837b3090b7fd71fbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\f0f5e6f32198fa1837b3090b7fd71fbb.exe'\"" f0f5e6f32198fa1837b3090b7fd71fbb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4492 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f5e6f32198fa1837b3090b7fd71fbb.exe"C:\Users\Admin\AppData\Local\Temp\f0f5e6f32198fa1837b3090b7fd71fbb.exe"1⤵
- Adds Run key to start application
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfmFilesize
16KB
MD5e6237a0334aea5ed4ffde61af694af40
SHA1b73b4ed49e23e12a0499b1ab06c1f35946bd4468
SHA2560ff9ac655b5bfa2982d69722ed9d34836edba19913915477ea1c4bc4e366d6cb
SHA512c43d062abf4067bdaa39f3327ea03c98dced2da472fa2bdb7a15886f9173f38189ea30fbeb1c1e5bdd6fc6d4b18abe7017be76e061256d2c6ec10fb5c0dd3d77
-
memory/4220-133-0x0000000000920000-0x0000000000921000-memory.dmpFilesize
4KB
-
memory/4220-134-0x0000000000400000-0x000000000081F000-memory.dmpFilesize
4.1MB
-
memory/4220-135-0x0000000000920000-0x0000000000921000-memory.dmpFilesize
4KB
-
memory/4220-136-0x0000000000400000-0x000000000081F000-memory.dmpFilesize
4.1MB
-
memory/4220-137-0x0000000004680000-0x0000000004A38000-memory.dmpFilesize
3.7MB
-
memory/4220-138-0x0000000000400000-0x000000000081F000-memory.dmpFilesize
4.1MB
-
memory/4492-187-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-191-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-184-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-185-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-186-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-167-0x0000026F75440000-0x0000026F75450000-memory.dmpFilesize
64KB
-
memory/4492-188-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-189-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-190-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-183-0x0000026F7DA20000-0x0000026F7DA21000-memory.dmpFilesize
4KB
-
memory/4492-192-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-193-0x0000026F7DA40000-0x0000026F7DA41000-memory.dmpFilesize
4KB
-
memory/4492-194-0x0000026F7D670000-0x0000026F7D671000-memory.dmpFilesize
4KB
-
memory/4492-195-0x0000026F7D660000-0x0000026F7D661000-memory.dmpFilesize
4KB
-
memory/4492-197-0x0000026F7D670000-0x0000026F7D671000-memory.dmpFilesize
4KB
-
memory/4492-200-0x0000026F7D660000-0x0000026F7D661000-memory.dmpFilesize
4KB
-
memory/4492-203-0x0000026F7D5A0000-0x0000026F7D5A1000-memory.dmpFilesize
4KB
-
memory/4492-151-0x0000026F75340000-0x0000026F75350000-memory.dmpFilesize
64KB
-
memory/4492-215-0x0000026F7D7A0000-0x0000026F7D7A1000-memory.dmpFilesize
4KB