Analysis

  • max time kernel
    14s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2023, 08:10

General

  • Target

    65aa411de88f6d3578228ebe1064f833b4604de3a53639170024e14e031aac0f.exe

  • Size

    1.8MB

  • MD5

    7cd52c097c7bbc8407bfa165aeeffb0e

  • SHA1

    978c538d9066f90b113cce31de33f1b4ab330aca

  • SHA256

    65aa411de88f6d3578228ebe1064f833b4604de3a53639170024e14e031aac0f

  • SHA512

    7da7df70a57bf88919ef65691ed7ee357a498446448abdf1332d740c8ad070b2ee37cf56e376eeedbeb2e4fb0ab82e78b91004ca3dfee04ed42bae12e9c06419

  • SSDEEP

    49152:yKJ0WR7AFPyyiSruXKpk3WFDL9zxnSlHwn9/7sbN6uR:yKlBAFPydSS6W6X9lnBp7sbN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65aa411de88f6d3578228ebe1064f833b4604de3a53639170024e14e031aac0f.exe
    "C:\Users\Admin\AppData\Local\Temp\65aa411de88f6d3578228ebe1064f833b4604de3a53639170024e14e031aac0f.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4384
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:3956
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:1296
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4192
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:3000
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:4920
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:2900
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:556
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:4424

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

      Filesize

      2.1MB

      MD5

      827d38f718466effdfe3a9fabaa4779b

      SHA1

      eee3cad08a13457530e34381fc6cf96514fa28fb

      SHA256

      8a7d9aa6a224a274f36c6935a48e1e2d2c5a57ec9c5c6763f0a37e4b2f2dc327

      SHA512

      01e620a9f970312219abf224ec0d11d36742bd56d31eacbb11f1849162da0f4146e82c8f830c816afb44c132f1da61189b0a4faa4e490bd7d6561acc474d7cfc

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      1.6MB

      MD5

      76f82a2cb6b5ad06afebadd9df9a0f3f

      SHA1

      89585289613a1314c7e68107e3db5f94c19e6ed1

      SHA256

      f57a3fa4041df69ee7150c0935935b886e6f68ed49360b19cae85ea8054d30ea

      SHA512

      0c4e65edf99dcc4a596a7beb59244410de745fdda87252aa8417f5edf60254fc7ba1a1e1bee20fe71c24f1a0220b6132b57a0090da7c3e5f5b50fcfda8cf435d

    • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      908KB

      MD5

      aa7a8222a4c8ec3d9461985d591df067

      SHA1

      6fbd27f16550b38f7261715ea16a8d51b3ff1ea6

      SHA256

      3c71e5fc51986f076065b938e62c87f8e71a2dc500be40029744df83283f6c9d

      SHA512

      66280ab1ad8202abaa4e656de47eaec90fa1e8cc63c7a3f753901125d9cf8843100292d64590ac7848600f9ec6dfce0a5ece3a1b5a83486b187d49cd0e06d3cc

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

      Filesize

      2.1MB

      MD5

      2b2979f34fcd922605e67fb1cc53c577

      SHA1

      2fbf3e5161ffcc7cebfe2674827fb7114d3796e8

      SHA256

      da0245799acaba54c74c6afd39069b8e65532433094ce6513d8eabe578b909d8

      SHA512

      7113f6182651db0e0ba5d79bc22f2d3b66742d4558f585a0303139f0bb8d55b7eb512998fc1dc6a2a1233d32d74ead671681fcf64e60f6e0be746c0fd2a968c8

    • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

      Filesize

      1.5MB

      MD5

      282627fcd677588bdc6619b8348f637f

      SHA1

      82d60761bfc116df8e00db117653d519bb6f74ae

      SHA256

      a090fa700aaebbbcc3c3e64d69209b26d2c97d8b53e1a7cd3aa15c41aa23473a

      SHA512

      620105911c7d12b8ac4140f0abf8337c4f5156f1676f2274b85fa833ee591f8f8a38404ba0f9b542bfdcea255bbe5417b4c6f5a31130b6906a27a5241a3611b3

    • C:\Windows\System32\FXSSVC.exe

      Filesize

      1.2MB

      MD5

      c69756787951d6857d9c7c3a4c90fe57

      SHA1

      af579406447e244a268d5670cfab268b9a8170d2

      SHA256

      c4f649177fc1492b2bf2d85205114a98619085e416cc7da1067b0fb6592e4c2b

      SHA512

      d23ad4ed09525f9be22e8a1dfab0bfa12896de77168dbc1b468e021e75eac37376a8a26d32bd1981766c9f9260f5fbd50c4daba00f14fed12237ccc2b26b09c8

    • C:\Windows\System32\alg.exe

      Filesize

      1.5MB

      MD5

      7f135c1cc8c851a81b3fbe319edd9c92

      SHA1

      fbf785338a974afd336396475beb7e69a586a333

      SHA256

      b099df78777de84c36930bc4b94f92a9ef4244d8290b1e4e4592abc7c1c527d9

      SHA512

      5f74831f4020ab8c5ac8547ded41a2eb010bd13d35201a9b98f79fcd853a79cc3fef93a62a8bed17a2d50b168f881026c3eaadce6677720ea44e9297938aa93b

    • C:\Windows\system32\AppVClient.exe

      Filesize

      1.3MB

      MD5

      f9fe8e9165ee85d4576b0f71eed56f88

      SHA1

      115b4d56074bb4c82f584561989aef3cd78556c5

      SHA256

      80166a64f22ec810726261f19b23611b4736011493a940b6565da97964c2092a

      SHA512

      099562723514f73f004f00fa5e4626ff0fb7e17e3b2630b65e2ca234d5c2528eceb1b1a9c929d7b6cb5cb8955af1644eda07b2fafa44ec76c5b6826eb84fd26a

    • C:\Windows\system32\fxssvc.exe

      Filesize

      1.2MB

      MD5

      c69756787951d6857d9c7c3a4c90fe57

      SHA1

      af579406447e244a268d5670cfab268b9a8170d2

      SHA256

      c4f649177fc1492b2bf2d85205114a98619085e416cc7da1067b0fb6592e4c2b

      SHA512

      d23ad4ed09525f9be22e8a1dfab0bfa12896de77168dbc1b468e021e75eac37376a8a26d32bd1981766c9f9260f5fbd50c4daba00f14fed12237ccc2b26b09c8

    • memory/556-144-0x0000000002280000-0x00000000022E0000-memory.dmp

      Filesize

      384KB

    • memory/556-146-0x0000000140000000-0x00000001401AA000-memory.dmp

      Filesize

      1.7MB

    • memory/1296-94-0x0000000140000000-0x0000000140189000-memory.dmp

      Filesize

      1.5MB

    • memory/1296-101-0x00000000006B0000-0x0000000000710000-memory.dmp

      Filesize

      384KB

    • memory/2900-139-0x00000000001A0000-0x0000000000200000-memory.dmp

      Filesize

      384KB

    • memory/2900-132-0x0000000140000000-0x000000014022B000-memory.dmp

      Filesize

      2.2MB

    • memory/2900-131-0x00000000001A0000-0x0000000000200000-memory.dmp

      Filesize

      384KB

    • memory/3000-115-0x0000000000E80000-0x0000000000EE0000-memory.dmp

      Filesize

      384KB

    • memory/3000-112-0x0000000000E80000-0x0000000000EE0000-memory.dmp

      Filesize

      384KB

    • memory/3000-116-0x0000000140000000-0x0000000140135000-memory.dmp

      Filesize

      1.2MB

    • memory/3000-105-0x0000000140000000-0x0000000140135000-memory.dmp

      Filesize

      1.2MB

    • memory/3000-106-0x0000000000E80000-0x0000000000EE0000-memory.dmp

      Filesize

      384KB

    • memory/3956-12-0x0000000140000000-0x000000014018A000-memory.dmp

      Filesize

      1.5MB

    • memory/3956-24-0x00000000006B0000-0x0000000000710000-memory.dmp

      Filesize

      384KB

    • memory/3956-143-0x0000000140000000-0x000000014018A000-memory.dmp

      Filesize

      1.5MB

    • memory/3956-13-0x00000000006B0000-0x0000000000710000-memory.dmp

      Filesize

      384KB

    • memory/3956-22-0x00000000006B0000-0x0000000000710000-memory.dmp

      Filesize

      384KB

    • memory/4384-7-0x0000000000B40000-0x0000000000BA7000-memory.dmp

      Filesize

      412KB

    • memory/4384-0-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/4384-128-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/4384-6-0x0000000000B40000-0x0000000000BA7000-memory.dmp

      Filesize

      412KB

    • memory/4384-223-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/4384-1-0x0000000000B40000-0x0000000000BA7000-memory.dmp

      Filesize

      412KB

    • memory/4920-119-0x0000000140000000-0x0000000140237000-memory.dmp

      Filesize

      2.2MB

    • memory/4920-120-0x0000000000440000-0x00000000004A0000-memory.dmp

      Filesize

      384KB

    • memory/4920-126-0x0000000000440000-0x00000000004A0000-memory.dmp

      Filesize

      384KB