Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    10/05/2022, 12:38

General

  • Target

    f1e6bf4d43ee2975292f57112c8fcb5d.exe

  • Size

    264KB

  • MD5

    f1e6bf4d43ee2975292f57112c8fcb5d

  • SHA1

    6c52c3a0707c3f9fe78ef47993e5ba6a854ff0b1

  • SHA256

    d7c1130bfed2081ab246aa229e524dd38eb91b22af6db68ddb89f1c760379d9a

  • SHA512

    fdf0b02c3e2bef352b46880a88960d51e30f6132351064087c557ec6a96498905d7eb316e81d047d8988e1de9da715082617a999bdd239fc712c8c9b17d61656

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1e6bf4d43ee2975292f57112c8fcb5d.exe
    "C:\Users\Admin\AppData\Local\Temp\f1e6bf4d43ee2975292f57112c8fcb5d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 1128
      2⤵
      • Program crash
      PID:1524

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/564-54-0x0000000000CE0000-0x0000000000D28000-memory.dmp

          Filesize

          288KB

        • memory/564-55-0x0000000075261000-0x0000000075263000-memory.dmp

          Filesize

          8KB