Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 20:19

General

  • Target

    Build.exe

  • Size

    701KB

  • MD5

    0efd05c0e785394f55153d5b9c04daf5

  • SHA1

    16e820e2f124ce21db4633379c475cff7c7448f3

  • SHA256

    8a3c4170a103e1695a2b70379c43266398759b3e02a841a75b08ecfa5716860d

  • SHA512

    84e2060eae231df6916273cd13b24f40145d6e2375b3b21ba1e5d685d8bd37c9cdce01c8975548b2db7e4ace15cb53d5b5883d315fa4120fed208f66f1580946

  • SSDEEP

    6144:57A/Mm07sENIsRctX5rUvQSNj0LZOWM8yucn:5U/MbirU1Nj0LZOd8yus

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Build.exe
    "C:\Users\Admin\AppData\Local\Temp\Build.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        3⤵
          PID:2108
      • C:\Users\Admin\AppData\Local\Temp\Build.exe
        "C:\Users\Admin\AppData\Local\Temp\Build.exe"
        2⤵
          PID:2956

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2220-0-0x00000000743CE000-0x00000000743CF000-memory.dmp

        Filesize

        4KB

      • memory/2220-1-0x0000000000E10000-0x0000000000EC6000-memory.dmp

        Filesize

        728KB

      • memory/2220-2-0x00000000743C0000-0x0000000074AAE000-memory.dmp

        Filesize

        6.9MB

      • memory/2220-16-0x00000000743C0000-0x0000000074AAE000-memory.dmp

        Filesize

        6.9MB

      • memory/2276-20-0x0000000002A40000-0x0000000002A50000-memory.dmp

        Filesize

        64KB

      • memory/2956-12-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

        Filesize

        4KB

      • memory/2956-13-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-10-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-8-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-15-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-14-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-6-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2956-4-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB