Analysis

  • max time kernel
    123s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2023, 19:07

General

  • Target

    549f35ae04b2340ae545ebcb80b06e2c2acdfb8779c740e82bb64a9ec9c894e3.exe

  • Size

    5.5MB

  • MD5

    05b51864ffdb2e41d09110c02e149d9c

  • SHA1

    b47d2cf448ca0aa7c3f9df4ca2360bd22bc64e8e

  • SHA256

    549f35ae04b2340ae545ebcb80b06e2c2acdfb8779c740e82bb64a9ec9c894e3

  • SHA512

    db53e72be807252d5ee196d4de060322b79740c6403fd1e22e4a923b84d7aa98455bd6ea8bf43aeb02db9a25bea34f92a76e3368f804cf812681711ae3e65dc1

  • SSDEEP

    98304:qJcdYMkS3td8utqAkGPf/jrVPlN4kZGoIduV49aafGjf5CrL7FbNn5K+amxpTV:qJgYlEWu4AprVdNsdvHfp3v5Klqpx

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\549f35ae04b2340ae545ebcb80b06e2c2acdfb8779c740e82bb64a9ec9c894e3.exe
    "C:\Users\Admin\AppData\Local\Temp\549f35ae04b2340ae545ebcb80b06e2c2acdfb8779c740e82bb64a9ec9c894e3.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:1648
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f0 0x2ec
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-0-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-1-0x0000000076A40000-0x0000000076C55000-memory.dmp

    Filesize

    2.1MB

  • memory/1648-3875-0x0000000076DF0000-0x0000000076F90000-memory.dmp

    Filesize

    1.6MB

  • memory/1648-5884-0x00000000759F0000-0x0000000075A6A000-memory.dmp

    Filesize

    488KB

  • memory/1648-13069-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13070-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13071-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13072-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13074-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13075-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13076-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13080-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB

  • memory/1648-13084-0x0000000000400000-0x0000000000F54000-memory.dmp

    Filesize

    11.3MB