Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    10-06-2022 02:18

General

  • Target

    tmp.exe

  • Size

    317KB

  • MD5

    30c968a254b1d5b817b33a7b2c8e0298

  • SHA1

    92173979722dd96e06328123a6e1d6d71c0f6dee

  • SHA256

    89fa3b0f03b9987da574b9f8c70f0086fce2a3029a707f5ee9712eeaca05b2d2

  • SHA512

    63c5718ccb677ca8c22557069ed71d95b6fd9a13e0bf0fb9bcb296c47693c83b0d74cbd544c026b6b75bb036d8ab299c779dbb95cb2a0e36cd56248b67fdd464

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 1440
      2⤵
      • Program crash
      PID:2628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1472 -ip 1472
    1⤵
      PID:4872

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1472-130-0x0000000000BCD000-0x0000000000BF9000-memory.dmp
      Filesize

      176KB

    • memory/1472-131-0x0000000000AC0000-0x0000000000AF9000-memory.dmp
      Filesize

      228KB

    • memory/1472-132-0x0000000000400000-0x000000000091A000-memory.dmp
      Filesize

      5.1MB

    • memory/1472-133-0x00000000051B0000-0x0000000005754000-memory.dmp
      Filesize

      5.6MB

    • memory/1472-134-0x0000000005760000-0x0000000005D78000-memory.dmp
      Filesize

      6.1MB

    • memory/1472-135-0x00000000050E0000-0x00000000050F2000-memory.dmp
      Filesize

      72KB

    • memory/1472-136-0x0000000005D80000-0x0000000005E8A000-memory.dmp
      Filesize

      1.0MB

    • memory/1472-137-0x0000000005120000-0x000000000515C000-memory.dmp
      Filesize

      240KB

    • memory/1472-138-0x0000000006120000-0x0000000006186000-memory.dmp
      Filesize

      408KB

    • memory/1472-139-0x0000000006900000-0x0000000006992000-memory.dmp
      Filesize

      584KB

    • memory/1472-140-0x00000000069B0000-0x0000000006A26000-memory.dmp
      Filesize

      472KB

    • memory/1472-141-0x0000000006AD0000-0x0000000006AEE000-memory.dmp
      Filesize

      120KB

    • memory/1472-142-0x0000000007970000-0x0000000007B32000-memory.dmp
      Filesize

      1.8MB

    • memory/1472-143-0x0000000007B50000-0x000000000807C000-memory.dmp
      Filesize

      5.2MB

    • memory/1472-144-0x0000000000BCD000-0x0000000000BF9000-memory.dmp
      Filesize

      176KB

    • memory/1472-145-0x0000000006DC0000-0x0000000006E10000-memory.dmp
      Filesize

      320KB

    • memory/1472-146-0x0000000000BCD000-0x0000000000BF9000-memory.dmp
      Filesize

      176KB

    • memory/1472-147-0x0000000000400000-0x000000000091A000-memory.dmp
      Filesize

      5.1MB