Analysis

  • max time kernel
    91s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:26

General

  • Target

    989609cd4ed516ea389fa3b9954e6d9f.exe

  • Size

    20KB

  • MD5

    989609cd4ed516ea389fa3b9954e6d9f

  • SHA1

    8882048fa9b0ff0ff8f683b29debb14ca5e51fc8

  • SHA256

    0e1b1cef75526a139b12ec18f2bb9f77bdab2d78e3aadb3ddc4e1e582fd5f786

  • SHA512

    be827b04b5b9dca309f6683a98ad62b3012ac508819fe79818a678a3a4b50d1eec4d2e8e44101ce7c07364a7de7f5cbd71d63dc389e97a0ec245117f54126769

  • SSDEEP

    384:4a23g2GJ/PwW1AqEVvqIAT/emE74y12hyuZSb09xtZKGpUXiGj6qdZMQET:ygLJ/VeqHE74y1+SA9JKGtYd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\989609cd4ed516ea389fa3b9954e6d9f.exe
    "C:\Users\Admin\AppData\Local\Temp\989609cd4ed516ea389fa3b9954e6d9f.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\989609~1.EXE > nul
      2⤵
        PID:1140
      • C:\Windows\SysWOW64\usrinit.exe
        "C:\Windows\system32\usrinit.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\usrinit.exe

      Filesize

      8KB

      MD5

      a4764222b83132703a0a16c48bc9d95b

      SHA1

      5ee283f2ce209b25d3ca30fe3c4d75987ac4cc71

      SHA256

      7127dd64a3147b9737c151b65cda40b9ec119e2e11d0064c261e003e9a884d34

      SHA512

      89ea5d0d6f212dc48426e94754ec81a51d7ebf97cdc8f0817967808c3774e3ec3a63d18803997bdf57e9a027b217cf8c1c614b6b3e2db2f5005d3a522151a401

    • C:\Windows\SysWOW64\winsvc.dll

      Filesize

      12KB

      MD5

      577ab6dc3f0e32f8fa9caa790ec132ea

      SHA1

      cca7dbc23293cccd5b82d82d1d8df7b9cb926678

      SHA256

      7962b92d0e0e2675708865d60ba5a923c9fda06e162589a1e85bc9939eb83e02

      SHA512

      2e7ceea2e09c3ec3e41c21f1cd86faa920e11c961be483c61b4ae3fefa83b181ef9a51d305853078db49846488e5d1e3d11e765944b030cfbaaca40afb2a103d

    • memory/3632-0-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/3632-10-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4244-15-0x0000000000910000-0x0000000000920000-memory.dmp

      Filesize

      64KB

    • memory/4244-14-0x0000000000910000-0x0000000000920000-memory.dmp

      Filesize

      64KB

    • memory/4244-13-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/4244-11-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4244-16-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4244-17-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/4244-19-0x0000000000910000-0x0000000000920000-memory.dmp

      Filesize

      64KB

    • memory/4244-18-0x0000000000910000-0x0000000000920000-memory.dmp

      Filesize

      64KB