Resubmissions

01-12-2024 15:28

241201-swsb4ayrhk 1

01-12-2024 15:28

241201-swgklayrgp 3

01-12-2024 15:26

241201-sva2esvlb1 5

01-12-2024 15:24

241201-ss3nnavkgz 5

01-12-2024 15:22

241201-sr2d7syqgq 10

01-12-2024 15:21

241201-srh8mavkdx 3

01-12-2024 15:17

241201-sn1cqsvjhy 3

Analysis

  • max time kernel
    102s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 15:26

General

  • Target

    img12.jpg

  • Size

    121KB

  • MD5

    5d28177027ff3505cac5faf30f3fce1c

  • SHA1

    f5344740e5814ad7b09c27723798a7b283597d98

  • SHA256

    c7e0b5d2f1fc049601bab9697108bb03bf9b8643a7d741f4cd6332931cf0457c

  • SHA512

    7143044d73e10281f1d3c0979c1daa0e6ae796edc3a56dd998a1d630c41d700d3d9af742c94d2b4b61a055d56a1203328819086c29c1038e58a495af1a4cc51d

  • SSDEEP

    3072:zha4q4WMs9qabD0BWweOhHfgT3wdnjejF6I:da45W1qQD0BReOhYjyCjF5

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand MICROSOFT.
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\img12.jpg
    1⤵
      PID:684
    • C:\Windows\system32\wwahost.exe
      "C:\Windows\system32\wwahost.exe" -ServerName:App.wwa
      1⤵
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4388
    • C:\Windows\system32\SystemSettingsAdminFlows.exe
      "C:\Windows\system32\SystemSettingsAdminFlows.exe" EditUser S-1-5-21-4089630652-1596403869-279772308-1001
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:5936
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3942855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\EIJ8KPUN\account.live[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • memory/4388-358-0x000001EF579E0000-0x000001EF57AE0000-memory.dmp

      Filesize

      1024KB

    • memory/4388-306-0x000001EF57630000-0x000001EF57730000-memory.dmp

      Filesize

      1024KB

    • memory/4388-199-0x000001EF44370000-0x000001EF44390000-memory.dmp

      Filesize

      128KB

    • memory/4388-307-0x000001EF57630000-0x000001EF57730000-memory.dmp

      Filesize

      1024KB

    • memory/4388-464-0x000001EF59530000-0x000001EF59630000-memory.dmp

      Filesize

      1024KB

    • memory/4388-457-0x000001EF583D0000-0x000001EF584D0000-memory.dmp

      Filesize

      1024KB

    • memory/4388-330-0x000001EF579E0000-0x000001EF57AE0000-memory.dmp

      Filesize

      1024KB

    • memory/4388-340-0x000001EF463E0000-0x000001EF464E0000-memory.dmp

      Filesize

      1024KB

    • memory/4388-302-0x000001EF472A0000-0x000001EF472C0000-memory.dmp

      Filesize

      128KB

    • memory/4388-1083-0x000001EF59970000-0x000001EF59A70000-memory.dmp

      Filesize

      1024KB

    • memory/4388-1159-0x000001EF579E0000-0x000001EF57AE0000-memory.dmp

      Filesize

      1024KB

    • memory/4388-1160-0x000001EF5C700000-0x000001EF5C800000-memory.dmp

      Filesize

      1024KB

    • memory/4388-1170-0x000001EF5C700000-0x000001EF5C800000-memory.dmp

      Filesize

      1024KB

    • memory/4388-1297-0x000001EF5BE70000-0x000001EF5BE90000-memory.dmp

      Filesize

      128KB