Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 05:08

General

  • Target

    shipping document.exe

  • Size

    713KB

  • MD5

    180165361384e56db00389733f0c54f5

  • SHA1

    1d48e601e3ba392fafde82b4a7fc0a39fba0a382

  • SHA256

    48ca70c01e870434304ccd508ef88d824b8d3c9588c990402dae450a5e56f73c

  • SHA512

    e6bcb1cc13e5229889cb9dfdf495bd44278259eb7a9dbaaa1d9d250be61e7b2665e3058592da07111c758b6e8901f7bacb67ee6df8d2048c8b39f5c5a010d3df

  • SSDEEP

    12288:yNgLeFR6IXlv312Z33NUiiVtMrT5Xgb/ToMiliQNDksybWWcirgNw76c/Xz0:mXJ312Z3uiUrTAi+yaWBrvB

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Users\Admin\AppData\Local\Temp\shipping document.exe
      "C:\Users\Admin\AppData\Local\Temp\shipping document.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Users\Admin\AppData\Local\Temp\shipping document.exe
        "C:\Users\Admin\AppData\Local\Temp\shipping document.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:4168
    • C:\Windows\SysWOW64\openfiles.exe
      "C:\Windows\SysWOW64\openfiles.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1352
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2976

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1352-36-0x000001B1265A0000-0x000001B126689000-memory.dmp

              Filesize

              932KB

            • memory/1476-19-0x0000000000E00000-0x0000000000E3F000-memory.dmp

              Filesize

              252KB

            • memory/1476-30-0x00000000030B0000-0x000000000314B000-memory.dmp

              Filesize

              620KB

            • memory/1476-27-0x0000000000E00000-0x0000000000E3F000-memory.dmp

              Filesize

              252KB

            • memory/1476-25-0x00000000030B0000-0x000000000314B000-memory.dmp

              Filesize

              620KB

            • memory/1476-24-0x0000000000E00000-0x0000000000E3F000-memory.dmp

              Filesize

              252KB

            • memory/1476-23-0x0000000002D60000-0x00000000030AA000-memory.dmp

              Filesize

              3.3MB

            • memory/1476-20-0x0000000000E00000-0x0000000000E3F000-memory.dmp

              Filesize

              252KB

            • memory/1848-8-0x00000000093E0000-0x000000000946A000-memory.dmp

              Filesize

              552KB

            • memory/1848-4-0x00000000056D0000-0x00000000056E0000-memory.dmp

              Filesize

              64KB

            • memory/1848-1-0x0000000000CB0000-0x0000000000D68000-memory.dmp

              Filesize

              736KB

            • memory/1848-12-0x0000000074910000-0x00000000750C0000-memory.dmp

              Filesize

              7.7MB

            • memory/1848-2-0x0000000005C30000-0x00000000061D4000-memory.dmp

              Filesize

              5.6MB

            • memory/1848-3-0x0000000005720000-0x00000000057B2000-memory.dmp

              Filesize

              584KB

            • memory/1848-9-0x000000000C770000-0x000000000C80C000-memory.dmp

              Filesize

              624KB

            • memory/1848-5-0x00000000057D0000-0x00000000057DA000-memory.dmp

              Filesize

              40KB

            • memory/1848-6-0x0000000005A90000-0x0000000005AB0000-memory.dmp

              Filesize

              128KB

            • memory/1848-7-0x0000000005AD0000-0x0000000005AE4000-memory.dmp

              Filesize

              80KB

            • memory/1848-0-0x0000000074910000-0x00000000750C0000-memory.dmp

              Filesize

              7.7MB

            • memory/3316-29-0x0000000002BF0000-0x0000000002CDA000-memory.dmp

              Filesize

              936KB

            • memory/3316-26-0x000000000D1E0000-0x000000000E37F000-memory.dmp

              Filesize

              17.6MB

            • memory/3316-28-0x0000000002BF0000-0x0000000002CDA000-memory.dmp

              Filesize

              936KB

            • memory/3316-18-0x000000000D1E0000-0x000000000E37F000-memory.dmp

              Filesize

              17.6MB

            • memory/3316-37-0x0000000002BF0000-0x0000000002CDA000-memory.dmp

              Filesize

              936KB

            • memory/4168-21-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4168-22-0x00000000018B0000-0x00000000018CC000-memory.dmp

              Filesize

              112KB

            • memory/4168-17-0x00000000018B0000-0x00000000018CC000-memory.dmp

              Filesize

              112KB

            • memory/4168-16-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4168-15-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4168-14-0x0000000001900000-0x0000000001C4A000-memory.dmp

              Filesize

              3.3MB

            • memory/4168-13-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/4168-10-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB