Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 21:00

General

  • Target

    5491448aa652aff2516fe94480286b34.exe

  • Size

    269KB

  • MD5

    5491448aa652aff2516fe94480286b34

  • SHA1

    b8cbd1b203157301180e2e8853b2f92e8875370c

  • SHA256

    16e48945d45ed636b7d4c15e745d290a49bd60ed831bd6f610f991b00820c4cd

  • SHA512

    6528a7ef1a71d27b819235f345782abf11175b19d575443c189c0a59765b406af15c3095f138953f2d5177f5e60a7b7391538ad4234d1950b28279bf3a8aabdd

  • SSDEEP

    6144:GWnCUNrk8/uK0Irrd8Hf23AyhAg1S9s/XiyI9f:jCUtn2UKf2wq1qsXiyMf

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5491448aa652aff2516fe94480286b34.exe
    "C:\Users\Admin\AppData\Local\Temp\5491448aa652aff2516fe94480286b34.exe"
    1⤵
    • Maps connected drives based on registry
    • Drops file in Windows directory
    PID:1640
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2332
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1640-2-0x0000000001700000-0x0000000001800000-memory.dmp

      Filesize

      1024KB

    • memory/1640-4-0x0000000001950000-0x000000000197F000-memory.dmp

      Filesize

      188KB

    • memory/1640-1-0x0000000001800000-0x0000000001810000-memory.dmp

      Filesize

      64KB

    • memory/1640-11-0x0000000001980000-0x00000000019A7000-memory.dmp

      Filesize

      156KB

    • memory/1640-0-0x0000000001AA0000-0x0000000001AB0000-memory.dmp

      Filesize

      64KB

    • memory/2784-25-0x0000022DE0540000-0x0000022DE0550000-memory.dmp

      Filesize

      64KB

    • memory/2784-41-0x0000022DE0640000-0x0000022DE0650000-memory.dmp

      Filesize

      64KB

    • memory/2784-61-0x0000022DE8A70000-0x0000022DE8A71000-memory.dmp

      Filesize

      4KB

    • memory/2784-60-0x0000022DE8960000-0x0000022DE8961000-memory.dmp

      Filesize

      4KB

    • memory/2784-59-0x0000022DE8960000-0x0000022DE8961000-memory.dmp

      Filesize

      4KB

    • memory/2784-57-0x0000022DE8930000-0x0000022DE8931000-memory.dmp

      Filesize

      4KB