Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 02:25

General

  • Target

    4c953616aa2b9cd1623b1bf0d4c4ac24.exe

  • Size

    123KB

  • MD5

    4c953616aa2b9cd1623b1bf0d4c4ac24

  • SHA1

    8b0d54b81fc620dd022685f9391c5e0fb3c87e3e

  • SHA256

    7df0e19bccf420f3b8d986e99e8e522048459aca5ae5d0c257c6219bcd6605d0

  • SHA512

    51b09a4464f8d370603baaf936109e3b73589e9353086b691445e1ae40018e1832034ca1f6629ecb7f2171805f364b2ea18031b9fe51398303e6bee523530f4d

  • SSDEEP

    3072:YP6nuMS0Vey2dVNrBNgpaVM5nTaQUKXtzpzm5z:YkJV72dfr3gkVM5nWQUKXtzZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c953616aa2b9cd1623b1bf0d4c4ac24.exe
    "C:\Users\Admin\AppData\Local\Temp\4c953616aa2b9cd1623b1bf0d4c4ac24.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Windows\Sgozua.exe
      C:\Windows\Sgozua.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Sgozua.exe

          Filesize

          103KB

          MD5

          7f5ade0c6820a0808ec59ca6af42e881

          SHA1

          93b1b21fbba5c1cc44d70178c42cf41198134b39

          SHA256

          4bc62b50e8cd9254d4fa12afb8acf20adce9e0cb5a0b9c3fb03e1f28b12385bd

          SHA512

          015e84c8e11f35210489c8a79164cbdd548bfea9698000a93b5c96d9cff4394356dc002ec8f3b4214128eeb36fa077b3050f49bba0e1c88efa30411faef12db1

        • C:\Windows\Sgozua.exe

          Filesize

          93KB

          MD5

          2c5392efac8428921ccd7d715c570727

          SHA1

          e71d5520318f955a4fe8ea73988aa58246d9139d

          SHA256

          87cc7f011dd4a22ecd7ec80d94f7a27a7ae26c128d8425afa5cfc1f28d598949

          SHA512

          aeaaba065b8ebef33e448d1af41f3d13bde53bae8ff54b9c1dc94c45747fb262b6f6eca40b2d41e48d225f80b054bb73da9ef31ee72089f7f530b605a981d998

        • memory/1360-33174-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1360-2-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/1360-1-0x00000000005A0000-0x00000000005C1000-memory.dmp

          Filesize

          132KB

        • memory/1360-13760-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-65126-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-20808-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-50166-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-11-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-79745-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-108568-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-125608-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-133617-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-133618-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-133620-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2760-133624-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB