Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 20:06

General

  • Target

    2f57aedc9fcd87aa0ab8e5c37f91de311397fed39b77ec1cc302c11c270f94d4.exe

  • Size

    260KB

  • MD5

    441001c42c7e3069d6f73e8bf47e2251

  • SHA1

    dec479001b3ff2b03290b07af844aeedf85989bf

  • SHA256

    2f57aedc9fcd87aa0ab8e5c37f91de311397fed39b77ec1cc302c11c270f94d4

  • SHA512

    3ec5a56da659eec8d18511c4ac696757b65acab12b57dbd7b0f86c61db0c4162bbde2231eae8b1d7facb967ef4ebec8a2d4eea8dc29bf228878caaf36e38d3d2

  • SSDEEP

    6144:BompWUZGx+fV+3IGsxOnUY59x+LxUTsFCejM:Bo8W00wVUIfkU43O2ToM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3432
    • C:\Users\Admin\AppData\Local\Temp\2f57aedc9fcd87aa0ab8e5c37f91de311397fed39b77ec1cc302c11c270f94d4.exe
      "C:\Users\Admin\AppData\Local\Temp\2f57aedc9fcd87aa0ab8e5c37f91de311397fed39b77ec1cc302c11c270f94d4.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Roaming\mfpmcher\appisist.exe
        "C:\Users\Admin\AppData\Roaming\mfpmcher"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Users\Admin\AppData\Local\Temp\~58FD.tmp
          3432 266248 4852 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 624
        3⤵
        • Program crash
        PID:4060
  • C:\Windows\SysWOW64\Cameoker.exe
    C:\Windows\SysWOW64\Cameoker.exe -s
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:3096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 216 -ip 216
    1⤵
      PID:3260

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~58FD.tmp

            Filesize

            8KB

            MD5

            aac3165ece2959f39ff98334618d10d9

            SHA1

            020a191bfdc70c1fbd3bf74cd7479258bd197f51

            SHA256

            96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974

            SHA512

            9eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf

          • C:\Users\Admin\AppData\Roaming\mfpmcher\appisist.exe

            Filesize

            260KB

            MD5

            40b44af8e65b84cd3f8da2d14a644eca

            SHA1

            15e1b336de1ba1dfbc57f12e084360c027bd63bd

            SHA256

            ca67357dbec69132460717c346063387418b85eeb5b71c6cbcf31b7008ea1762

            SHA512

            d9c9d42b00dc727737ce8539f26cb34e7f6ee47e87ed49687ebc8c7458dd5d0cfb0ccad297e167b57d3ce5509627bf7b6ddae7fd5bd3eab719a4d8c285a082d5

          • memory/216-27-0x00000000005A0000-0x00000000005EB000-memory.dmp

            Filesize

            300KB

          • memory/216-0-0x0000000000430000-0x0000000000475000-memory.dmp

            Filesize

            276KB

          • memory/216-1-0x00000000005A0000-0x00000000005EB000-memory.dmp

            Filesize

            300KB

          • memory/3096-17-0x00000000013E0000-0x00000000013E6000-memory.dmp

            Filesize

            24KB

          • memory/3096-16-0x0000000001430000-0x0000000001436000-memory.dmp

            Filesize

            24KB

          • memory/3096-15-0x00000000013E0000-0x00000000013E6000-memory.dmp

            Filesize

            24KB

          • memory/3096-14-0x0000000000F60000-0x0000000000FAB000-memory.dmp

            Filesize

            300KB

          • memory/3096-13-0x0000000000B50000-0x0000000000B95000-memory.dmp

            Filesize

            276KB

          • memory/3096-28-0x00000000013E0000-0x00000000013E6000-memory.dmp

            Filesize

            24KB

          • memory/3432-20-0x00000000046D0000-0x0000000004721000-memory.dmp

            Filesize

            324KB

          • memory/3432-22-0x00000000046D0000-0x0000000004721000-memory.dmp

            Filesize

            324KB

          • memory/3432-23-0x0000000000CA0000-0x0000000000CA6000-memory.dmp

            Filesize

            24KB

          • memory/3432-24-0x0000000002610000-0x000000000261D000-memory.dmp

            Filesize

            52KB

          • memory/4852-11-0x00000000008D0000-0x000000000091B000-memory.dmp

            Filesize

            300KB

          • memory/4852-10-0x0000000000F40000-0x0000000000F85000-memory.dmp

            Filesize

            276KB