Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 21:08

General

  • Target

    f8470dbc357cc54eb2adc7a93d32159e.exe

  • Size

    987KB

  • MD5

    f8470dbc357cc54eb2adc7a93d32159e

  • SHA1

    d59a64a1a3c2271830d02769419e5ebc38fb615c

  • SHA256

    0523462833fcc4578c83d4953e87d19fcfa732bc584c8238ec79a34be83261af

  • SHA512

    a610beecddb026e80be8e647386ed45c9a1168416a3b9898389778c984b915591134493d96b251c0a19477133cfd29b4a958523e21ab9211dc75bd70ba31f7a9

  • SSDEEP

    24576:jgkPnXqTXd/juSyG0uHWm91TExakK021D0HHprQZ8y:jVOd9yG0u2c1VkK/F0I

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8470dbc357cc54eb2adc7a93d32159e.exe
    "C:\Users\Admin\AppData\Local\Temp\f8470dbc357cc54eb2adc7a93d32159e.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 1912
      2⤵
      • Program crash
      PID:3656
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2180 -ip 2180
    1⤵
      PID:5036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads