Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 23:00

General

  • Target

    76534e332f704e6fc71a6efa111c915f38290c2f5f14e3b20aacd8ff2cac7f65.exe

  • Size

    233KB

  • MD5

    10369e0a531385b829cf4aa759ce0f90

  • SHA1

    f5b58f9faa5fda2aaf2a1ef4cf17eb3e541eda56

  • SHA256

    76534e332f704e6fc71a6efa111c915f38290c2f5f14e3b20aacd8ff2cac7f65

  • SHA512

    628144797abe9cc01d27babdf1e5df8de3bd237aa4d4bba2c201bea8c0c0e6bf4b9b14dd688f2b9a28570d2c0e9a9d0464802937bf06f3858b32425693170583

  • SSDEEP

    6144:66pDZLNLS+9JDAqDtJyTERkRhOp5H/SuhIcRMRtfDEvnqaJyf8:667LNV9JdDtJyekR4f/z6tfD3aEU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\76534e332f704e6fc71a6efa111c915f38290c2f5f14e3b20aacd8ff2cac7f65.exe
      "C:\Users\Admin\AppData\Local\Temp\76534e332f704e6fc71a6efa111c915f38290c2f5f14e3b20aacd8ff2cac7f65.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Users\Admin\AppData\Roaming\Certreg\coloac32.exe
        "C:\Users\Admin\AppData\Roaming\Certreg"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\~4825.tmp
          3296 239112 4348 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3692
      • C:\Windows\SysWOW64\cmd.exe
        /C 240601171.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Windows\SysWOW64\attrib.exe
          attrib -r -s -h "76534e332f704e6fc71a6efa111c915f38290c2f5f14e3b20aacd8ff2cac7f65.exe"
          4⤵
          • Views/modifies file attributes
          PID:2400
  • C:\Windows\SysWOW64\caclcher.exe
    C:\Windows\SysWOW64\caclcher.exe -s
    1⤵
    • Executes dropped EXE
    PID:2688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\240601171.cmd

          Filesize

          291B

          MD5

          0c49312148c6148e71c7304e56d9a5ae

          SHA1

          1dcea7bc81af4a5a0452eb3ea7b02adc6808d57d

          SHA256

          0f7bd684fae4d3ee42ad1da1b9e7d7701d988f2b9fe8edf898834242cc67137a

          SHA512

          89b091fc2bf7a163d9aef9391adc92c16f5ae81b8c217c91c9500e970adb85c3e8758aba71961b2162da05208239f58c31fd338d06c99be7a51dbab2f785081e

        • C:\Users\Admin\AppData\Local\Temp\~4825.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • C:\Users\Admin\AppData\Roaming\Certreg\coloac32.exe

          Filesize

          233KB

          MD5

          8edbdfd9c33954a2887565d6a46ca98d

          SHA1

          4fc4d1afc5f7332aa6ad7b69b2b826724ebfc0a0

          SHA256

          def5dc1631b73994a34f69b2ad6da806f6b5fc95df4c5a8f9ad65ea3ab9c4c4b

          SHA512

          4ed82a87f656a39d1f31247f714cb876a61716b1cae978e99e05d9c5914ae1160d9b8cafd127f874be857bf763afed35c3618e7b9dcc07ec6eef9ef76d5b5d7c

        • memory/3296-15-0x0000000003280000-0x00000000032CA000-memory.dmp

          Filesize

          296KB

        • memory/3296-20-0x00000000032E0000-0x00000000032E6000-memory.dmp

          Filesize

          24KB

        • memory/3296-17-0x0000000003280000-0x00000000032CA000-memory.dmp

          Filesize

          296KB

        • memory/3296-21-0x0000000007D10000-0x0000000007D1D000-memory.dmp

          Filesize

          52KB

        • memory/4348-7-0x0000000000570000-0x00000000005B3000-memory.dmp

          Filesize

          268KB

        • memory/4348-10-0x0000000000A20000-0x0000000000A25000-memory.dmp

          Filesize

          20KB

        • memory/5092-0-0x0000000000D70000-0x0000000000DB3000-memory.dmp

          Filesize

          268KB