Analysis

  • max time kernel
    1738s
  • max time network
    1170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 13:06

General

  • Target

    qIYFtzy.exe

  • Size

    907KB

  • MD5

    53d4e5a0d6a88b2122a4bf7a250e7eac

  • SHA1

    a63b703c1fda969f4d106a92fa97c50bdff35df0

  • SHA256

    7419d8b873f0cfc592effec892577be9877b3d83f031aa352c90e098f5f27da8

  • SHA512

    0f40c22a10e27b50f75f9eadc362979286e0ffc16e2ac6d96bfc6fe87a90eaaf20d0a1520351e5678aa947635a4f6eba9605d48f1b15d9e4069fa8c6ebd401ef

  • SSDEEP

    12288:0TL+YS9yexcDJOlrsA3ph0lhSMXlirR2aZGDVK2bK0:0iyeQOlrsA5h0lhSMXlYR2aZGDVrK0

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qIYFtzy.exe
    "C:\Users\Admin\AppData\Local\Temp\qIYFtzy.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color B
      2⤵
        PID:4104
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4960
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:632

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/632-1-0x000002AC0D640000-0x000002AC0D650000-memory.dmp

        Filesize

        64KB

      • memory/632-17-0x000002AC0D740000-0x000002AC0D750000-memory.dmp

        Filesize

        64KB

      • memory/632-33-0x000002AC15CD0000-0x000002AC15CD1000-memory.dmp

        Filesize

        4KB

      • memory/632-34-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-35-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-36-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-37-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-38-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-39-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-40-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-41-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-42-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-43-0x000002AC15CF0000-0x000002AC15CF1000-memory.dmp

        Filesize

        4KB

      • memory/632-44-0x000002AC15920000-0x000002AC15921000-memory.dmp

        Filesize

        4KB

      • memory/632-45-0x000002AC15910000-0x000002AC15911000-memory.dmp

        Filesize

        4KB

      • memory/632-47-0x000002AC15920000-0x000002AC15921000-memory.dmp

        Filesize

        4KB

      • memory/632-50-0x000002AC15910000-0x000002AC15911000-memory.dmp

        Filesize

        4KB

      • memory/632-53-0x000002AC15850000-0x000002AC15851000-memory.dmp

        Filesize

        4KB

      • memory/632-65-0x000002AC15A50000-0x000002AC15A51000-memory.dmp

        Filesize

        4KB

      • memory/632-67-0x000002AC15A60000-0x000002AC15A61000-memory.dmp

        Filesize

        4KB

      • memory/632-68-0x000002AC15A60000-0x000002AC15A61000-memory.dmp

        Filesize

        4KB

      • memory/632-69-0x000002AC15B70000-0x000002AC15B71000-memory.dmp

        Filesize

        4KB