Analysis

  • max time kernel
    91s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-06-2024 02:20

General

  • Target

    0990e32b124536c31ef5d775c56e8963.exe

  • Size

    156KB

  • MD5

    0990e32b124536c31ef5d775c56e8963

  • SHA1

    62c4ccd65452c38a663b96e4a60f3cea471afbac

  • SHA256

    cb261a506b111d4007e82b3e71e4da57b889a1482bfa2093afecd95e9531827b

  • SHA512

    3553a2c0846e0f774736991b424d92a11e33d2594ffc04655a6c7e84ba590f5365f24ffd7173b74221616b41724b5ab4d59a9e77eea294be1da0cb05377d1583

  • SSDEEP

    3072:H0gEMwy3BDoBeIxlegNV4w+bAoO659Ex+kLMFoJMuh/1U1u3:H2LWB+e2j0DXEx+kwoJMufAu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
    "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
      "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe
        "C:\Users\Admin\AppData\Local\Temp\0990e32b124536c31ef5d775c56e8963.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4012
        • C:\Users\Admin\AppData\Roaming\Wjlxlt.exe
          "C:\Users\Admin\AppData\Roaming\Wjlxlt.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Users\Admin\AppData\Roaming\Wjlxlt.exe
            "C:\Users\Admin\AppData\Roaming\Wjlxlt.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:528
            • C:\Users\Admin\AppData\Roaming\Wjlxlt.exe
              "C:\Users\Admin\AppData\Roaming\Wjlxlt.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3848
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3456
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2416
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:17410 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eKEF17H7E1.tmp

    Filesize

    3KB

    MD5

    38d6eb5672a223ab464dfd0e356738d7

    SHA1

    132e053dadf1fdcec3e4cc72060a2c5f667e6656

    SHA256

    e94c6ab4c3cddc905fc9f36205422eddff9e24badd0e200f6789a40862603a64

    SHA512

    a03471f9d1084fad5f55dd4c1fd701c6ac782cfce45911619ad25e5a003164879dc3c68562e939973ce548438162f37e275c88df84fce84881bf0ee0c835929d

  • C:\Users\Admin\AppData\Roaming\Wjlxlt.exe

    Filesize

    156KB

    MD5

    0990e32b124536c31ef5d775c56e8963

    SHA1

    62c4ccd65452c38a663b96e4a60f3cea471afbac

    SHA256

    cb261a506b111d4007e82b3e71e4da57b889a1482bfa2093afecd95e9531827b

    SHA512

    3553a2c0846e0f774736991b424d92a11e33d2594ffc04655a6c7e84ba590f5365f24ffd7173b74221616b41724b5ab4d59a9e77eea294be1da0cb05377d1583

  • memory/2824-4-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2824-6-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2824-7-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3848-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3848-37-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4012-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4012-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4012-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4012-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB