Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2023 08:17

General

  • Target

    9d77e2feecf244c42e236d75c7a4a6d9f6af14c0c290b39f3b89d3dfd44326f2.exe

  • Size

    1.6MB

  • MD5

    f6f26327a28a330fa614868e7914e1e1

  • SHA1

    6e6b041af415b32d874cb8cad2c72e2282b6f996

  • SHA256

    9d77e2feecf244c42e236d75c7a4a6d9f6af14c0c290b39f3b89d3dfd44326f2

  • SHA512

    79dfcd45f61dd2e0472a4b427aa5b4be170c5c322ddf82982fa95460d69a926b74e1db986145778cbf969668658610c3eaba594d1e575977e625e5879ba1983d

  • SSDEEP

    49152:LJwj/5W2CuuEnm6MwHzBrusZQXT5Xq51:Mjm6MowjD5y1

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d77e2feecf244c42e236d75c7a4a6d9f6af14c0c290b39f3b89d3dfd44326f2.exe
    "C:\Users\Admin\AppData\Local\Temp\9d77e2feecf244c42e236d75c7a4a6d9f6af14c0c290b39f3b89d3dfd44326f2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2212
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:4364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2212-0-0x00007FF947F90000-0x00007FF948A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2212-1-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB

  • memory/2212-2-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB

  • memory/2212-3-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB

  • memory/2212-4-0x0000018EA6650000-0x0000018EA6658000-memory.dmp

    Filesize

    32KB

  • memory/2212-5-0x0000018EA6CE0000-0x0000018EA6D18000-memory.dmp

    Filesize

    224KB

  • memory/2212-6-0x0000018EA6890000-0x0000018EA689E000-memory.dmp

    Filesize

    56KB

  • memory/2212-22-0x00007FF947F90000-0x00007FF948A51000-memory.dmp

    Filesize

    10.8MB

  • memory/2212-23-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB

  • memory/2212-30-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB

  • memory/2212-31-0x0000018EA1430000-0x0000018EA1440000-memory.dmp

    Filesize

    64KB