Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 15:28

General

  • Target

    file.exe

  • Size

    818KB

  • MD5

    272f79d7dba64ba20220bb1defc4839e

  • SHA1

    400167cf29c6724242d427c7d4bf5269098521c5

  • SHA256

    f213641d9a278bd07f490d237d7b51f77f106fd345a8627a955904f3757b9d8b

  • SHA512

    abd7f51cc69148b0dc4732e4649447c1a654252b9a1cd49ec78a26d1dc26e176101b9a888515335488fcd595b9da5c288a6be999c133550b894cb299a18a991f

  • SSDEEP

    24576:Sv7C3c6roXM/Qm39KcZvCooxgxUpClDffxh5gtY+VTkC:SzooX8JhZvIxgxKClDxh5gtY+VTk

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:876
    • C:\Windows\SysWOW64\convert.exe
      "C:\Windows\SysWOW64\convert.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:3696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/876-18-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/876-19-0x0000000001AB0000-0x0000000001AD2000-memory.dmp

      Filesize

      136KB

    • memory/876-16-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/876-13-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/876-11-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/876-23-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/876-15-0x0000000001730000-0x0000000001A7A000-memory.dmp

      Filesize

      3.3MB

    • memory/876-24-0x0000000001AB0000-0x0000000001AD2000-memory.dmp

      Filesize

      136KB

    • memory/876-17-0x0000000000400000-0x0000000000443000-memory.dmp

      Filesize

      268KB

    • memory/3444-39-0x0000000007F70000-0x0000000008033000-memory.dmp

      Filesize

      780KB

    • memory/3444-20-0x000000000E120000-0x0000000010E3C000-memory.dmp

      Filesize

      45.1MB

    • memory/3444-28-0x000000000E120000-0x0000000010E3C000-memory.dmp

      Filesize

      45.1MB

    • memory/3444-30-0x0000000007F70000-0x0000000008033000-memory.dmp

      Filesize

      780KB

    • memory/3444-31-0x0000000007F70000-0x0000000008033000-memory.dmp

      Filesize

      780KB

    • memory/3452-8-0x0000000006090000-0x00000000060A0000-memory.dmp

      Filesize

      64KB

    • memory/3452-4-0x0000000005AF0000-0x0000000005AFA000-memory.dmp

      Filesize

      40KB

    • memory/3452-10-0x0000000007020000-0x00000000070BC000-memory.dmp

      Filesize

      624KB

    • memory/3452-9-0x0000000006D90000-0x0000000006E1A000-memory.dmp

      Filesize

      552KB

    • memory/3452-0-0x00000000752AE000-0x00000000752AF000-memory.dmp

      Filesize

      4KB

    • memory/3452-7-0x0000000006080000-0x000000000608E000-memory.dmp

      Filesize

      56KB

    • memory/3452-1-0x0000000000F80000-0x0000000001052000-memory.dmp

      Filesize

      840KB

    • memory/3452-2-0x00000000060A0000-0x0000000006644000-memory.dmp

      Filesize

      5.6MB

    • memory/3452-6-0x0000000006060000-0x0000000006076000-memory.dmp

      Filesize

      88KB

    • memory/3452-14-0x00000000752A0000-0x0000000075A50000-memory.dmp

      Filesize

      7.7MB

    • memory/3452-3-0x0000000005A30000-0x0000000005AC2000-memory.dmp

      Filesize

      584KB

    • memory/3452-5-0x00000000752A0000-0x0000000075A50000-memory.dmp

      Filesize

      7.7MB

    • memory/3696-38-0x000001CA497D0000-0x000001CA4989B000-memory.dmp

      Filesize

      812KB

    • memory/4920-27-0x00000000016B0000-0x0000000001751000-memory.dmp

      Filesize

      644KB

    • memory/4920-26-0x0000000000D40000-0x0000000000D7F000-memory.dmp

      Filesize

      252KB

    • memory/4920-29-0x0000000000D40000-0x0000000000D7F000-memory.dmp

      Filesize

      252KB

    • memory/4920-25-0x0000000001790000-0x0000000001ADA000-memory.dmp

      Filesize

      3.3MB

    • memory/4920-22-0x0000000000D40000-0x0000000000D7F000-memory.dmp

      Filesize

      252KB

    • memory/4920-21-0x0000000000D40000-0x0000000000D7F000-memory.dmp

      Filesize

      252KB