Analysis

  • max time kernel
    153s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 02:07

General

  • Target

    file.exe

  • Size

    460KB

  • MD5

    7753b2e80f90c21024a33e9d6dd8804c

  • SHA1

    3760b58f20b36c1945475458a0425de2edf682db

  • SHA256

    a314527c483746231794e1c087529350230c74562a776f78319086f92e164418

  • SHA512

    75e9f6d6e0456d6cf724a9c02d09aa9a6d6df7a478382051c57d39cbbc53af883b72fc44cdafda724fddb868ce01fee93e887afb99e319eaf21fafd53ac55733

Score
9/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 1316
      2⤵
      • Program crash
      PID:4148
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3408 -ip 3408
    1⤵
      PID:2708

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3408-130-0x0000000000C20000-0x0000000000C9A000-memory.dmp

      Filesize

      488KB

    • memory/3408-131-0x0000000008050000-0x00000000085F4000-memory.dmp

      Filesize

      5.6MB

    • memory/3408-132-0x0000000007B40000-0x0000000007BD2000-memory.dmp

      Filesize

      584KB

    • memory/3408-133-0x0000000007B20000-0x0000000007B2A000-memory.dmp

      Filesize

      40KB

    • memory/3408-134-0x000000000B370000-0x000000000B40C000-memory.dmp

      Filesize

      624KB

    • memory/3408-135-0x000000000B640000-0x000000000B6A6000-memory.dmp

      Filesize

      408KB