Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2022 12:40

General

  • Target

    tmp.exe

  • Size

    367KB

  • MD5

    aa979a2bca63f039582ed76b0c7e5133

  • SHA1

    5445e4449f1d6e343dab38149cbc7453ae243782

  • SHA256

    da9c1b1ead104b546de4b49463c35e2f846a00c326c7bb307bc7515c593025a7

  • SHA512

    93266cfff68bd6f513937e0336a6e93630409ef2fcd7343e6c506aee44139f2f344023244e55a0cda02d78d7ae92f6c108b03f91c508af7619f3c5ef6104979b

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4248
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 1108
      2⤵
      • Program crash
      PID:2308
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4248 -ip 4248
    1⤵
      PID:4444

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4248-130-0x00000000005ED000-0x0000000000618000-memory.dmp
      Filesize

      172KB

    • memory/4248-131-0x0000000000540000-0x0000000000578000-memory.dmp
      Filesize

      224KB

    • memory/4248-132-0x0000000004C50000-0x00000000051F4000-memory.dmp
      Filesize

      5.6MB

    • memory/4248-133-0x0000000000400000-0x0000000000473000-memory.dmp
      Filesize

      460KB

    • memory/4248-134-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/4248-135-0x0000000005880000-0x0000000005892000-memory.dmp
      Filesize

      72KB

    • memory/4248-136-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4248-137-0x0000000005A10000-0x0000000005A4C000-memory.dmp
      Filesize

      240KB

    • memory/4248-138-0x0000000005CD0000-0x0000000005D36000-memory.dmp
      Filesize

      408KB

    • memory/4248-139-0x0000000006370000-0x00000000063E6000-memory.dmp
      Filesize

      472KB

    • memory/4248-140-0x0000000006490000-0x0000000006522000-memory.dmp
      Filesize

      584KB

    • memory/4248-141-0x0000000006670000-0x000000000668E000-memory.dmp
      Filesize

      120KB

    • memory/4248-142-0x0000000006890000-0x0000000006A52000-memory.dmp
      Filesize

      1.8MB

    • memory/4248-143-0x0000000006A60000-0x0000000006F8C000-memory.dmp
      Filesize

      5.2MB

    • memory/4248-144-0x00000000005ED000-0x0000000000618000-memory.dmp
      Filesize

      172KB

    • memory/4248-145-0x0000000000540000-0x0000000000578000-memory.dmp
      Filesize

      224KB

    • memory/4248-146-0x00000000005ED000-0x0000000000618000-memory.dmp
      Filesize

      172KB

    • memory/4248-147-0x0000000000400000-0x0000000000473000-memory.dmp
      Filesize

      460KB