Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 16:21

General

  • Target

    4ec8ca8dd0c11283448403c20ef87a8f.exe

  • Size

    12KB

  • MD5

    4ec8ca8dd0c11283448403c20ef87a8f

  • SHA1

    89a8e0a015e12473ed6fe17d1cf310e7ed55fc30

  • SHA256

    e88daa890f42b5d6da8086978c51f9a075f5fa69614c1fe8793435c4e3e69f8b

  • SHA512

    b4c4693b3175aaad772783636bb4f1d1a6d5e971d47ac3e2b25a96b1542f61e1375ea5fa3ba209779c801de9e749f7caf446d49fd29e959ffba48df0402150b3

  • SSDEEP

    192:Ixs1aDvPtCdusj0bLoiYPF8laLlLcsAQt+NU5EA+R5fdr3rWMBAe9ZbJnIyCaoZk:IlbhsIbLoiYvNcsttPy5fzAeKywZUL55

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ec8ca8dd0c11283448403c20ef87a8f.exe
    "C:\Users\Admin\AppData\Local\Temp\4ec8ca8dd0c11283448403c20ef87a8f.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3988
    • \??\c:\users\admin\appdata\local\temp\4ec8ca8dd0c11283448403c20ef87a8f.exe
      c:\users\admin\appdata\local\temp\4ec8ca8dd0c11283448403c20ef87a8f.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
        • Sets service image path in registry
        • Deletes itself
        PID:4868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 344
          4⤵
          • Program crash
          PID:1960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4868 -ip 4868
    1⤵
      PID:920

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\windows\SysWOW64\mssrv32.exe

            Filesize

            12KB

            MD5

            4ec8ca8dd0c11283448403c20ef87a8f

            SHA1

            89a8e0a015e12473ed6fe17d1cf310e7ed55fc30

            SHA256

            e88daa890f42b5d6da8086978c51f9a075f5fa69614c1fe8793435c4e3e69f8b

            SHA512

            b4c4693b3175aaad772783636bb4f1d1a6d5e971d47ac3e2b25a96b1542f61e1375ea5fa3ba209779c801de9e749f7caf446d49fd29e959ffba48df0402150b3

          • memory/3008-5-0x0000000015110000-0x0000000015119000-memory.dmp

            Filesize

            36KB

          • memory/3988-1-0x0000000015110000-0x0000000015119000-memory.dmp

            Filesize

            36KB

          • memory/3988-6-0x0000000015110000-0x0000000015119000-memory.dmp

            Filesize

            36KB

          • memory/4868-4-0x0000000015110000-0x0000000015119000-memory.dmp

            Filesize

            36KB

          • memory/4868-8-0x0000000015110000-0x0000000015119000-memory.dmp

            Filesize

            36KB