Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 18:12

General

  • Target

    6ff9010618c92ebd5425684b26b7dff4.exe

  • Size

    577KB

  • MD5

    6ff9010618c92ebd5425684b26b7dff4

  • SHA1

    afcca43e44da1065f738ad426f65678a8aedf1fd

  • SHA256

    498fb2c8c874e3d63168021abb6c4b0caa23dd3df704bc27d175d2da59018432

  • SHA512

    94bbf4bc58ca22c2cb847d40b0b3d1d0008a6e7920ca70b829388d36707e81a6df16a3f9c1b1872a5dfc70a93496343715af8efb4346f5aaf979bc465105e0dd

  • SSDEEP

    12288:hau9M494jXi1em6M71qHfgudE0SXeqLfJrjGp0c2qrptpyxr9A4dB:hawMDYJzKO759c2qVOB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe
    "C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe
        "C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\smashing.exe
          "C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\smashing.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4360
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1672
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3d0 0x398
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6ff9010618c92ebd5425684b26b7dff4.exe

    Filesize

    541KB

    MD5

    1320f7fbd7445928deb146c52a59f242

    SHA1

    b939fcc9aed3881336f42924f407d85879b37ed0

    SHA256

    754a120387e79dd7cababa1e44749ca1742b6cb8ab446481f5ac4782f11ed94f

    SHA512

    75901e410ff6a5d33a67fcafdca1c4000e3f6348fa47f6b2a019c103a10a633ee1b25de03a8859f6b37910be6b2b6e25b2a0c5361f9fd7611cc902c31a2f7132

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    3c090bac965ee3543728d16b87a4d29f

    SHA1

    859fbb59a7d8468100d20fd120a100d555651438

    SHA256

    e54391a41a9a2807f1f5117a5e2947e9bc2875ae91fa2ac8868d26a3208d7d39

    SHA512

    de351362ee253d63a4eea0f66cb5172bd219c51774e58186add730e6f752b94a7ae0ef4bafc22aa260532410a75bc9c01d7355c3d707168683f3e925d68a2dd8

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\smashing.exe

    Filesize

    761KB

    MD5

    a1116fe87bb624aa01397c2df435cafc

    SHA1

    245d4ee66b52b520d335938d25a505f46a330379

    SHA256

    aa1694d15ec9434959fb78d81c96f5e4ef6c409dc24c8e59ecf22bd44295857b

    SHA512

    a55e03803322579337079aea7e6c7734ecb31c2c283aec1729d17ce790655fd23052002687a1bc85d5c35f6b052b44ab54fdabf68fcda601505078575ac88f5b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    345861f739ef259c33abc7ef49b81694

    SHA1

    3b6aff327d91e66a207c0557eac6ddefab104598

    SHA256

    fc3220611aded768e37b125c4e4d5a8ffdbf7dfa8d8c19c07c7791b486457948

    SHA512

    7b0aae948a594f29125a3e80f6c2b51421cda07f5ee4554538037f12b87d4b3937ee74fb400505efcd2a953c897a49d79d875148516dcef619c514251854dfad

  • memory/1140-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1672-34-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1672-46-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1672-58-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2832-3-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3752-32-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3752-33-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4360-35-0x0000000002080000-0x0000000002090000-memory.dmp

    Filesize

    64KB