Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:07

General

  • Target

    77e2c26553905fe3dea8deb624b6fa2c.exe

  • Size

    73KB

  • MD5

    77e2c26553905fe3dea8deb624b6fa2c

  • SHA1

    85bfc36d57c2ff7c2a8c7c5fda959d27039f91c7

  • SHA256

    45f209e5cbc511d9f2be44b9a23ed4251358927f5cbb186c6191ac649ca1e845

  • SHA512

    253dcd33139ca6c156b15277ab8be11269662435e853dd529bdccba97475a5499fbd9d0fcd314aa734ceef837a33aea597895e2821f18773ec9b0548f49c5464

  • SSDEEP

    768:UYXA5GjhpM7h/KEx/IM2+RVPdFfhbGl9O92G33H9wP/YLjb06v1x:UqAIm/BRFdFfhCl9OMG33H2P/Yb3v1x

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77e2c26553905fe3dea8deb624b6fa2c.exe
    "C:\Users\Admin\AppData\Local\Temp\77e2c26553905fe3dea8deb624b6fa2c.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\Internet Explorer.lnk

    Filesize

    989B

    MD5

    380fcb60672b67212f4a51160fdb015c

    SHA1

    edd235b3d3e4d6aa85995e9f1d7b6ea8065bc6b5

    SHA256

    3e804e45b6fba3e76d731dd1d35e826806a927b905f844cf8b60428bbe109066

    SHA512

    56ce7fc59aa34583d2f1eb783a2da6c6285a0009c8471f3f6fa40acf8bdf78ead9951125b7705a180fe8e27ee73dbe6bbde2be7f0f0b3a96c86f8d0bca97e149

  • C:\Users\Admin\Desktop\Microsoft Edge.lnk

    Filesize

    2KB

    MD5

    dd56c6135ab70a7783e8a181d4eb968a

    SHA1

    6a68554ee0d19830a4a962952efefadbcc545f61

    SHA256

    cabf140dde01785313b79ee598ae93425878ea4253c10d39570394718a94ec19

    SHA512

    22d899a98ab952d8ccd463d56406ec0e4fcf6a59bce00a32e4d755e323e2b453969e67df1e4258fd8b274fc6ae24ae2cefe9769576a2fad1b949d3633187e06b

  • C:\Users\Public\Desktop\Acrobat Reader DC.lnk

    Filesize

    2KB

    MD5

    7ae4af1355be1f01cb85186c87383faa

    SHA1

    2b9413bf5fe1c32ee8f6298699545fd6161a065f

    SHA256

    561a57d3238c101e51cd35ea7e5e5e9cdc47f1c6f07e91477b382164769de504

    SHA512

    efd1877bc1d22e923e4f4dd3adefbefe6c0727baabc6dfc1a02d1f07f058bf94e7c98297d540261adee2a2cdf7b7527e8fbe759dd5e5dd59b4ba0a8f8c0b4c84

  • C:\Users\Public\Desktop\Firefox.lnk

    Filesize

    1KB

    MD5

    d992605dd4c3f4a949250f4f97ddf6d3

    SHA1

    ff59e5a0a388a14820cfb38ebc730e59330b7603

    SHA256

    08f0c0bbf04fc758908f966abd6bbe43c789f60cf515d9a85f9e6b9f313c8485

    SHA512

    8ac1711d34a6b0b1f05a3efd435c41a687cd8ba95aab34843b974cae24db456e2b9ace3c3c09ab9880190a2c625298dc42e938f3aa3fe99755a9722a86d3b5e0

  • C:\Users\Public\Desktop\Google Chrome.lnk

    Filesize

    2KB

    MD5

    962a8478c29e16ea504d818bf7d4d0a0

    SHA1

    a5af7db8354a116f1aeac07bef8d0d651706961c

    SHA256

    39f763615057aaaae18b312e743a15fe6ed6e7585f8c8010d6a6751ec671287e

    SHA512

    11d1f851cf7d4350f6a3a2aae279f80b197f2e6982e71bc22593d77809e0b1c37ead80aa3ed96c4671658725c8bb69bd88cca8dd8bc5958f222c790f1df48b26

  • C:\Users\Public\Desktop\VLC media player.lnk

    Filesize

    923B

    MD5

    0b022e703dbb51f1e4f1deb32d4d1ced

    SHA1

    aae42fe3a05380d66c87f51b10b4d067cbd48f4f

    SHA256

    4805b9017f3a9deb5b974fbb9f3d57bd29a49b747e152c2141b2a6b0e0712ed5

    SHA512

    93bbd5d36d7fb99433e04536fdb1ebfcfb54ba225ca56f31f52aabe31ae6e5bb595f2ee5cb4db7e01e8e16e900284adfe7995cc9762d9369d27739b16a19e254

  • memory/2544-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB