Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 19:12

General

  • Target

    015cb1433ad5d4f7cfb72fefba6cc36b.exe

  • Size

    1.6MB

  • MD5

    015cb1433ad5d4f7cfb72fefba6cc36b

  • SHA1

    bec1e1bf9e16a16caa4dce200cb54dc9af5ef12a

  • SHA256

    3a4ce5c299b6fcecad76b505dd00c88dcaca801a92b01e25faf3bd50fbce2d08

  • SHA512

    ddd761f209408e52f762bb4f41be60d07d6388497fb4603f4b2038a2c916c0f94fa96a61ccc610bacd6c522f2960b9bcbdd6af8197f1cd60c19912f00c38036b

  • SSDEEP

    49152:hiPgURpYKe5ejnaFNmHBSKRIivbEGENkxSAX3l:A3R7JntBqiTEGENnAnl

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Modifies registry class 13 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\015cb1433ad5d4f7cfb72fefba6cc36b.exe
    "C:\Users\Admin\AppData\Local\Temp\015cb1433ad5d4f7cfb72fefba6cc36b.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\015cb1433ad5d4f7cfb72fefba6cc36b.exe
      "C:\Users\Admin\AppData\Local\Temp\015cb1433ad5d4f7cfb72fefba6cc36b.exe"
      2⤵
        PID:1548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MBX@E38@2A20F38.###

      Filesize

      2KB

      MD5

      b61b2e6ec1837c4a4cca350da492d0d6

      SHA1

      94e8db87c57ce6c1e669b3c677e0d86c7bfce721

      SHA256

      a2a5f9f34ab73591c5d4884448e8e8e569daae6f36e89d5dbd6c3ad7a12c0994

      SHA512

      5519a1951cce1cf5af4ff58fe34c89e8682d3bd48a2175b9b776e53d1e8f371f5c093402330a8f251a8d5f22f0712e37ecc326ea0677b5f717a767d8fb9f6b95

    • C:\Users\Admin\AppData\Local\Temp\MBX@E38@2A20F48.###

      Filesize

      2KB

      MD5

      dcf5a857f6c55d929ff2b20f9d3c348a

      SHA1

      5e10ae28c6d38e5090ea19e7d9736d6ef4cbb823

      SHA256

      d051099a6185411991a3d6f0a467d6219ef6f4047f0ab4f103a554a4e68cac98

      SHA512

      dd84750d82b264ea81d9d72d524d474a21070e72a27dd7ec12e438cb9ff51bb46695ecbefb541ffbe842c476b005014ac32abaeca5301653da345a6318929ea6

    • memory/1548-40-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/1548-46-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-23-0x0000000051B80000-0x0000000051BA4000-memory.dmp

      Filesize

      144KB

    • memory/3640-33-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB

    • memory/3640-13-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB

    • memory/3640-16-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-29-0x0000000051B00000-0x0000000051B1E000-memory.dmp

      Filesize

      120KB

    • memory/3640-31-0x0000000051B00000-0x0000000051B1E000-memory.dmp

      Filesize

      120KB

    • memory/3640-24-0x0000000051B80000-0x0000000051BA4000-memory.dmp

      Filesize

      144KB

    • memory/3640-0-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-22-0x0000000051B80000-0x0000000051BA4000-memory.dmp

      Filesize

      144KB

    • memory/3640-12-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-32-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB

    • memory/3640-14-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-34-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB

    • memory/3640-37-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB

    • memory/3640-43-0x0000000051B00000-0x0000000051B1E000-memory.dmp

      Filesize

      120KB

    • memory/3640-42-0x0000000051B80000-0x0000000051BA4000-memory.dmp

      Filesize

      144KB

    • memory/3640-11-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-10-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-9-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-41-0x0000000000400000-0x000000000059C000-memory.dmp

      Filesize

      1.6MB

    • memory/3640-2-0x00000000007B0000-0x00000000007FD000-memory.dmp

      Filesize

      308KB