Analysis

  • max time kernel
    126s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 09:56

General

  • Target

    193b60b98b114fb0be76052cb833c1fd4113da3e4d64ef74fdc130bcc23757db.exe

  • Size

    1.4MB

  • MD5

    f357156e8157dcf81f5dcc174e0570ba

  • SHA1

    5496b42b39ccdb7e2797bfe63909c429a216605d

  • SHA256

    193b60b98b114fb0be76052cb833c1fd4113da3e4d64ef74fdc130bcc23757db

  • SHA512

    b8fbc9ae6203d560d964aea33e43d19253df304074e1c0e31de93111ae6876362599fabf4437d423fd43093cf6c33c2fcc85e1153709f14dc7e9702f62ffb5f0

  • SSDEEP

    24576:wReOx+zoeroeAUe7vr6K5BrkSz8uS7QwO1:wReOfUAv2K5BrkG8uS7XO1

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3536
      • C:\Users\Admin\AppData\Local\Temp\193b60b98b114fb0be76052cb833c1fd4113da3e4d64ef74fdc130bcc23757db.exe
        "C:\Users\Admin\AppData\Local\Temp\193b60b98b114fb0be76052cb833c1fd4113da3e4d64ef74fdc130bcc23757db.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:812
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/812-0-0x00000000750CE000-0x00000000750CF000-memory.dmp

      Filesize

      4KB

    • memory/812-1-0x0000000000BE0000-0x0000000000D50000-memory.dmp

      Filesize

      1.4MB

    • memory/812-2-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-3-0x00000000060A0000-0x00000000061EC000-memory.dmp

      Filesize

      1.3MB

    • memory/812-9-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-15-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-57-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-67-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-65-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-63-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-61-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-59-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-55-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-53-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-51-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-49-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-47-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-43-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-41-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-39-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-37-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-33-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-31-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-29-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-27-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-23-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-21-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-17-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-13-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-11-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-7-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-5-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-45-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-35-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-19-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-26-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-4-0x00000000060A0000-0x00000000061E7000-memory.dmp

      Filesize

      1.3MB

    • memory/812-1078-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1080-0x00000000063F0000-0x000000000643C000-memory.dmp

      Filesize

      304KB

    • memory/812-1079-0x0000000006480000-0x0000000006546000-memory.dmp

      Filesize

      792KB

    • memory/812-1083-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1085-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1087-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1086-0x00000000750CE000-0x00000000750CF000-memory.dmp

      Filesize

      4KB

    • memory/812-1088-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1089-0x0000000006F80000-0x0000000007524000-memory.dmp

      Filesize

      5.6MB

    • memory/812-1090-0x0000000006720000-0x0000000006774000-memory.dmp

      Filesize

      336KB

    • memory/812-1091-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/812-1095-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/1652-1099-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/1652-1094-0x0000000000400000-0x000000000048A000-memory.dmp

      Filesize

      552KB

    • memory/1652-1098-0x0000000005570000-0x000000000560C000-memory.dmp

      Filesize

      624KB

    • memory/1652-1097-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB

    • memory/1652-1096-0x00000000013B0000-0x00000000013B8000-memory.dmp

      Filesize

      32KB

    • memory/1652-3970-0x0000000005360000-0x000000000538C000-memory.dmp

      Filesize

      176KB

    • memory/1652-3971-0x00000000750C0000-0x0000000075870000-memory.dmp

      Filesize

      7.7MB