Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:18

General

  • Target

    fc55b9995187a760c7153a2c1030f110.exe

  • Size

    176KB

  • MD5

    fc55b9995187a760c7153a2c1030f110

  • SHA1

    ef991c51a29aacb1b2d1bb25c348d140bbad1f71

  • SHA256

    79fd64a0b17fd6be42578030ef1b3d0c9b804dc97485c0c8fe7f3c119c2637df

  • SHA512

    a4e135b2f3b0d9296e5d9f844cf3954fdaf637df766aa6c8efd90dd9a7285ee56d28f7d657bfa9742dfcb3f2cef92f79ed7d1105ac9fb7e6bfe5e1118ade7bbe

  • SSDEEP

    3072:cWJ5CbGcHiqnlMaEmJN1wshWsN3CMG7JqY4+Iw1hkCZ+Q7vzDnqAYgy:k8qnasNyMot4+diS+Q7bDq2y

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc55b9995187a760c7153a2c1030f110.exe
    "C:\Users\Admin\AppData\Local\Temp\fc55b9995187a760c7153a2c1030f110.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4596-0-0x00007FFBC4970000-0x00007FFBC5311000-memory.dmp

    Filesize

    9.6MB

  • memory/4596-1-0x000000001B860000-0x000000001BD2E000-memory.dmp

    Filesize

    4.8MB

  • memory/4596-2-0x00007FFBC4970000-0x00007FFBC5311000-memory.dmp

    Filesize

    9.6MB

  • memory/4596-3-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-4-0x000000001BD30000-0x000000001BDD6000-memory.dmp

    Filesize

    664KB

  • memory/4596-8-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-7-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-6-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-10-0x000000001C430000-0x000000001C47C000-memory.dmp

    Filesize

    304KB

  • memory/4596-9-0x000000001B220000-0x000000001B228000-memory.dmp

    Filesize

    32KB

  • memory/4596-5-0x000000001BE80000-0x000000001BF1C000-memory.dmp

    Filesize

    624KB

  • memory/4596-11-0x000000001D030000-0x000000001D100000-memory.dmp

    Filesize

    832KB

  • memory/4596-12-0x000000001C480000-0x000000001C580000-memory.dmp

    Filesize

    1024KB

  • memory/4596-13-0x00007FFBC4970000-0x00007FFBC5311000-memory.dmp

    Filesize

    9.6MB

  • memory/4596-14-0x00007FFBC4970000-0x00007FFBC5311000-memory.dmp

    Filesize

    9.6MB

  • memory/4596-15-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-16-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-17-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-18-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-19-0x0000000000CD0000-0x0000000000CE0000-memory.dmp

    Filesize

    64KB

  • memory/4596-20-0x000000001C480000-0x000000001C580000-memory.dmp

    Filesize

    1024KB