Analysis

  • max time kernel
    160s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 21:22

General

  • Target

    4478197965fc24bea622103c4d2d6034.exe

  • Size

    11KB

  • MD5

    4478197965fc24bea622103c4d2d6034

  • SHA1

    9b14e272fce68ea98838d5c681a50b1a35c0a80c

  • SHA256

    b5567973a2b5910efdc61230802b86292c0acbd4825458f189c5dfc947562f80

  • SHA512

    91da6566159760dadd8fab60f0ac940a6ed6ee6ecf072f8f59139bec528249fc607abd45f3bf204e14d83827dcf55ec17634040f142688917a56b21ca80614be

  • SSDEEP

    192:5BOCoGOuWAsLXMVjy0xNcr5rXkUqt6hwcCwVj/O9oMkSqBfAwtwTe6LbKZiP:5BXoGOuRsLXW7xNcr5kUQ2DUTkVX6Lek

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4478197965fc24bea622103c4d2d6034.exe
    "C:\Users\Admin\AppData\Local\Temp\4478197965fc24bea622103c4d2d6034.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3404
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\TIMHost.dll

      Filesize

      6KB

      MD5

      8678d9e701005978b5d86a11d762e814

      SHA1

      32259b6ac8fdc2e3e3e4f6507e41f40640968e44

      SHA256

      26e9ec84e3ccba99247ce222d38d053942dbd92066d8214d1adf80f40c2ba9e0

      SHA512

      f046df4fe2ded5f5260b6f18434071a6292b8027792d5ccdb9e18294cb4231c6924c0bb990cdc4cf4baf1038cfe365c0eb0ec593f1b975af34f77a7dfda46d11

    • memory/3352-5-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/3352-4-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/3404-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3404-1-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB

    • memory/3404-9-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3404-11-0x0000000010000000-0x0000000010007000-memory.dmp

      Filesize

      28KB

    • memory/3404-13-0x00000000006B0000-0x00000000006B1000-memory.dmp

      Filesize

      4KB