Analysis

  • max time kernel
    31s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-06-2022 16:25

General

  • Target

    28ce5de07e027e7ed408b31c97a8f376f32b55c931a3b5514f4c1792d8875fca.exe

  • Size

    7KB

  • MD5

    0cac1aacdd9e7445d1930f43aa2d5c7b

  • SHA1

    61dd9d21246118873318966e0d545920188b93d0

  • SHA256

    28ce5de07e027e7ed408b31c97a8f376f32b55c931a3b5514f4c1792d8875fca

  • SHA512

    70a6c2b1c3e88bd79800254c8c6fd4caae4a28a9b0494459fce564e3217f22d2bf3a6c69d25e166cd13a3909698cf2368de8801def23f889261d9d2145ecb9fa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28ce5de07e027e7ed408b31c97a8f376f32b55c931a3b5514f4c1792d8875fca.exe
    "C:\Users\Admin\AppData\Local\Temp\28ce5de07e027e7ed408b31c97a8f376f32b55c931a3b5514f4c1792d8875fca.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 1532
      2⤵
      • Program crash
      PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-54-0x00000000001A0000-0x00000000001A8000-memory.dmp

    Filesize

    32KB

  • memory/1756-55-0x00000000753B1000-0x00000000753B3000-memory.dmp

    Filesize

    8KB