Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2024 18:54

General

  • Target

    6357cdde0a16a8152cbe43037178938e.exe

  • Size

    87KB

  • MD5

    6357cdde0a16a8152cbe43037178938e

  • SHA1

    bc3e3601f40999fd80eccb267e60c2d9cf268731

  • SHA256

    f008dbbb1cbe15e9030dd44786d8bf3170dfbc907537b7cbc916cb263e2ac926

  • SHA512

    6f856b712cca6e77314ed476b7973373b683b7178bd5d3e4436847c1bf000b8773d0484085dbf3caeed4fed0a38d159bfb73a13268957bad8c4e40d6eff88936

  • SSDEEP

    1536:6qM4XNeXgJEOMPd5aBKTafQQPxz6Vlc+vFzckReXZCnSL7AC2Tp7oKZRkATJeupQ:6qMD5aBKTazPxuF9zdbSL7AC2TFvjJzk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6357cdde0a16a8152cbe43037178938e.exe
    "C:\Users\Admin\AppData\Local\Temp\6357cdde0a16a8152cbe43037178938e.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\B653.exe eee
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\B653.exe
        C:\Windows\system32\B653.exe eee
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2320
    • C:\Windows\SysWOW64\9D6B.exe
      C:\Windows\system32\9D6B.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\B653.exe eee
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\SysWOW64\B653.exe
          C:\Windows\system32\B653.exe eee
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4800
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:3300
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4724

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\9Z3APUJS.htm

      Filesize

      395KB

      MD5

      47bbbe9f3dd285767c7d8d9f9c483a1b

      SHA1

      5de4b9a75eea1ee8b3839e238d2148fa3b6e35b0

      SHA256

      4194f4a1c80b621f1d684c70775cfbb5ac25368f6d1c4fed124c723f0712b40e

      SHA512

      01f0effc55ed272c3a710217c800719370a3574baf5640875c169b012d58cebc43a8b225546cc4c51e811d5ff3212eaae14596bba3adc448a3de56c69fb7332e

    • C:\Windows\SysWOW64\9D6B.exe

      Filesize

      87KB

      MD5

      6357cdde0a16a8152cbe43037178938e

      SHA1

      bc3e3601f40999fd80eccb267e60c2d9cf268731

      SHA256

      f008dbbb1cbe15e9030dd44786d8bf3170dfbc907537b7cbc916cb263e2ac926

      SHA512

      6f856b712cca6e77314ed476b7973373b683b7178bd5d3e4436847c1bf000b8773d0484085dbf3caeed4fed0a38d159bfb73a13268957bad8c4e40d6eff88936

    • C:\Windows\SysWOW64\B653.exe

      Filesize

      112KB

      MD5

      ea04f7606fa834831e8802aae171bd4a

      SHA1

      1d6693b8d059e0d08768add88c02c1680195bf6f

      SHA256

      67481b9c7ab2974d1920e9043d40b7dd58be51f326913588dba37df532891af4

      SHA512

      5bf324d15d6ae04218883d59937df51a52f7d5d3ff414472f0cef895a2807a3d1c47313a9298407ecc7fc713cb49c74b37a8d0d2132e1e6239a07b687e50b1c4

    • C:\Windows\SysWOW64\MSWINSCK.OCX

      Filesize

      105KB

      MD5

      9484c04258830aa3c2f2a70eb041414c

      SHA1

      b242a4fb0e9dcf14cb51dc36027baff9a79cb823

      SHA256

      bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

      SHA512

      9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

    • memory/2648-32-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2648-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/2648-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4724-35-0x0000013D58C40000-0x0000013D58C50000-memory.dmp

      Filesize

      64KB

    • memory/4724-51-0x0000013D58D40000-0x0000013D58D50000-memory.dmp

      Filesize

      64KB

    • memory/4724-67-0x0000013D61030000-0x0000013D61031000-memory.dmp

      Filesize

      4KB

    • memory/4724-69-0x0000013D61060000-0x0000013D61061000-memory.dmp

      Filesize

      4KB

    • memory/4724-70-0x0000013D61060000-0x0000013D61061000-memory.dmp

      Filesize

      4KB

    • memory/4724-71-0x0000013D61170000-0x0000013D61171000-memory.dmp

      Filesize

      4KB

    • memory/4940-20-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4940-21-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/4940-34-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB