Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 13:26

General

  • Target

    7a5eab58bb4310fc23b03af65aa66afa.exe

  • Size

    776KB

  • MD5

    7a5eab58bb4310fc23b03af65aa66afa

  • SHA1

    6591767a8a063d7d499f588a12d4d7bfb9c02763

  • SHA256

    49aeb7c801aaf180053f374a7a988c6e490e01ec1cae2ae75c6703abc2e26261

  • SHA512

    8d9ef975da2e6573fe7df9ab8cf24aec7937b19b930087074d7bcc20749729a7f541e253d1321c703b686ca8a2300ff4321d8d062ee211b2f727a9b8bf150f64

  • SSDEEP

    24576:goc2lxDl/El+YFFtumDDHlRvoJdSn+qvwLKBGDOlbbREj:g4l8RFT7lutqvSal9Ej

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a5eab58bb4310fc23b03af65aa66afa.exe
    "C:\Users\Admin\AppData\Local\Temp\7a5eab58bb4310fc23b03af65aa66afa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Microsoft\uncryp7ed.exe

          Filesize

          1.1MB

          MD5

          f08fe6920d8b7466965c0e7c64de710e

          SHA1

          eccd193cdebf54085ca7c559c2799f488b514238

          SHA256

          331ba6b1e342d503af3e298928a9482267399f184e15df9e6da6d07b8d80aaac

          SHA512

          1bde9271dadac0d20e02234de3f2a49758e1da196401f3cbddb45cb75ca59fab2902ed5017872f87ebd9955d069f8f0d4d06a6b399fe4beace4085f714aa35ae

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1.1MB

          MD5

          d881de17aa8f2e2c08cbb7b265f928f9

          SHA1

          08936aebc87decf0af6e8eada191062b5e65ac2a

          SHA256

          b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

          SHA512

          5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

        • memory/2652-19-0x0000000074DD0000-0x0000000074E4A000-memory.dmp

          Filesize

          488KB

        • memory/2652-5-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2652-10-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2652-18-0x00000000763C0000-0x00000000764B0000-memory.dmp

          Filesize

          960KB

        • memory/2652-20-0x0000000076EF6000-0x0000000076EF7000-memory.dmp

          Filesize

          4KB

        • memory/2652-21-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2652-27-0x00000000763C0000-0x00000000764B0000-memory.dmp

          Filesize

          960KB

        • memory/3096-2-0x0000000001860000-0x0000000001870000-memory.dmp

          Filesize

          64KB

        • memory/3096-12-0x00000000745E0000-0x0000000074B91000-memory.dmp

          Filesize

          5.7MB

        • memory/3096-1-0x00000000745E0000-0x0000000074B91000-memory.dmp

          Filesize

          5.7MB

        • memory/3096-0-0x00000000745E0000-0x0000000074B91000-memory.dmp

          Filesize

          5.7MB