Analysis

  • max time kernel
    0s
  • max time network
    90s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 23:06

General

  • Target

    067b0f880d322032555d8bfcac8947f7.exe

  • Size

    114KB

  • MD5

    067b0f880d322032555d8bfcac8947f7

  • SHA1

    97c0690049ebe39aed918a95a5dfc5061366fc37

  • SHA256

    e25da7724db0945d80b2d5d156de6e5e74ca015137a5d978e7d3bee0b47160fc

  • SHA512

    7b065a1641485dea95c67190035b778670154d48043da0a29fa245e4b41903d7115bf0829d9b1929837029ac2497b47644ff8400768e75630509859c4fbc10e5

  • SSDEEP

    3072:+KrpqYLBsBMbbNWgg5d3h5A/28Q4h/tT:Tp9CDgKhy/tV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\067b0f880d322032555d8bfcac8947f7.exe
    "C:\Users\Admin\AppData\Local\Temp\067b0f880d322032555d8bfcac8947f7.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\067b0f880d322032555d8bfcac8947f7.exe"
      2⤵
        PID:3444
      • C:\Windows\sbd.EXE
        C:\Windows\sbd.EXE
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:17410 /prefetch:2
      1⤵
        PID:2972
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        1⤵
        • Modifies Internet Explorer settings
        PID:2368

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1064-8-0x0000000010000000-0x0000000010025000-memory.dmp

              Filesize

              148KB

            • memory/1064-6-0x0000000010000000-0x0000000010025000-memory.dmp

              Filesize

              148KB

            • memory/2368-7-0x0000000010000000-0x0000000010025000-memory.dmp

              Filesize

              148KB

            • memory/4680-0-0x0000000010000000-0x0000000010025000-memory.dmp

              Filesize

              148KB

            • memory/4680-9-0x0000000010000000-0x0000000010025000-memory.dmp

              Filesize

              148KB