Analysis

  • max time kernel
    136s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-10-2021 17:53

General

  • Target

    04162b1bcb2ebb326fc52801821e42b0.exe

  • Size

    12KB

  • MD5

    04162b1bcb2ebb326fc52801821e42b0

  • SHA1

    2443aac454b8299bdfea13017cc2339d605dacea

  • SHA256

    259dbea8ad36ca1f502f7eba9257bf7111313f4ef76c34922cd34dd5808b5181

  • SHA512

    701f55f4da2fddcf42ee9c0be5539a4f4e617b8a837ed88647295b1f98cf407ae52df19557c8202c303714301c6cccefd0acad49da4c138aa2d140c1d41e6973

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04162b1bcb2ebb326fc52801821e42b0.exe
    "C:\Users\Admin\AppData\Local\Temp\04162b1bcb2ebb326fc52801821e42b0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 1596
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1620

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/628-60-0x0000000001060000-0x0000000001061000-memory.dmp
    Filesize

    4KB

  • memory/628-62-0x00000000757C1000-0x00000000757C3000-memory.dmp
    Filesize

    8KB

  • memory/628-63-0x00000000044E0000-0x00000000044E1000-memory.dmp
    Filesize

    4KB

  • memory/1620-64-0x0000000000000000-mapping.dmp
  • memory/1620-65-0x0000000000360000-0x0000000000361000-memory.dmp
    Filesize

    4KB