Analysis

  • max time kernel
    126s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 18:11

General

  • Target

    6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe

  • Size

    1.3MB

  • MD5

    35b611cdea14a62de14b1f8471162853

  • SHA1

    f138441d6987c1f57d448965bc64f9bc417d3844

  • SHA256

    6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723

  • SHA512

    b75ed07047c03174cc8a3f86808786200fb0e74e051bee758ccefc64cbea98915927c86ca799daff7ec44256674cf4159682cae375bfc570cdc3e89947e65e6b

  • SSDEEP

    24576:hGtcJ+P7/Nx4aZcoootnwKDJiBPrMpG0mFmcyNCFZnI9QU3:6D1qaZcH6wGiBPD02mLYbc

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:1800
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/60-134-0x00000000746C0000-0x0000000074E70000-memory.dmp

          Filesize

          7.7MB

        • memory/60-133-0x00000000008F0000-0x0000000000A3C000-memory.dmp

          Filesize

          1.3MB

        • memory/60-135-0x0000000005990000-0x0000000005F34000-memory.dmp

          Filesize

          5.6MB

        • memory/60-136-0x0000000005480000-0x0000000005512000-memory.dmp

          Filesize

          584KB

        • memory/60-137-0x00000000053C0000-0x00000000053D0000-memory.dmp

          Filesize

          64KB

        • memory/60-138-0x0000000005450000-0x000000000545A000-memory.dmp

          Filesize

          40KB

        • memory/60-142-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-139-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-140-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-144-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-146-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-148-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-152-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-150-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-154-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-158-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-156-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-160-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-162-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-164-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-166-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-168-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-170-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-172-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-174-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-176-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-178-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-180-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-182-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-184-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-186-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-188-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-190-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-192-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-194-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-196-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-198-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-200-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-202-0x0000000006AB0000-0x0000000006B75000-memory.dmp

          Filesize

          788KB

        • memory/60-1215-0x00000000746C0000-0x0000000074E70000-memory.dmp

          Filesize

          7.7MB

        • memory/60-1216-0x0000000005980000-0x0000000005981000-memory.dmp

          Filesize

          4KB

        • memory/60-1217-0x00000000053C0000-0x00000000053D0000-memory.dmp

          Filesize

          64KB

        • memory/60-1220-0x00000000746C0000-0x0000000074E70000-memory.dmp

          Filesize

          7.7MB

        • memory/1884-1221-0x00000000746C0000-0x0000000074E70000-memory.dmp

          Filesize

          7.7MB

        • memory/1884-1222-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/1884-1223-0x0000000005470000-0x0000000005480000-memory.dmp

          Filesize

          64KB

        • memory/1884-1224-0x0000000005370000-0x00000000053D6000-memory.dmp

          Filesize

          408KB

        • memory/1884-1225-0x0000000006160000-0x00000000061B0000-memory.dmp

          Filesize

          320KB

        • memory/1884-1226-0x00000000746C0000-0x0000000074E70000-memory.dmp

          Filesize

          7.7MB

        • memory/1884-1227-0x0000000005470000-0x0000000005480000-memory.dmp

          Filesize

          64KB