Analysis

  • max time kernel
    83s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2022 13:57

General

  • Target

    tmp.exe

  • Size

    397KB

  • MD5

    e46f80ad123b84740d3fa93c510f4d6b

  • SHA1

    a38a7536dbe67be239178f744f49592b6f57dd78

  • SHA256

    8f00e9b2c63600af5efc5f6b5bf9e0ace5fbd18f6bd812f2f82b268a90b6f88b

  • SHA512

    6634a7f526e4e4bee7d883c1585a84dc3036ef5b843304dde73bf977807edb97f7eab1a5061f718a9d96db795bc57dc29047e5d0ac43e7961928b610da5ab89f

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1532
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 2032
      2⤵
      • Program crash
      PID:3824
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1532 -ip 1532
    1⤵
      PID:616

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1532-132-0x000000000076D000-0x0000000000798000-memory.dmp
      Filesize

      172KB

    • memory/1532-133-0x00000000021F0000-0x0000000002228000-memory.dmp
      Filesize

      224KB

    • memory/1532-134-0x0000000004D20000-0x00000000052C4000-memory.dmp
      Filesize

      5.6MB

    • memory/1532-135-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1532-136-0x00000000052D0000-0x00000000058E8000-memory.dmp
      Filesize

      6.1MB

    • memory/1532-137-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
      Filesize

      72KB

    • memory/1532-138-0x00000000058F0000-0x00000000059FA000-memory.dmp
      Filesize

      1.0MB

    • memory/1532-139-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/1532-140-0x0000000005CD0000-0x0000000005D62000-memory.dmp
      Filesize

      584KB

    • memory/1532-141-0x0000000005D70000-0x0000000005DE6000-memory.dmp
      Filesize

      472KB

    • memory/1532-142-0x0000000005F90000-0x0000000005FAE000-memory.dmp
      Filesize

      120KB

    • memory/1532-143-0x0000000005FF0000-0x0000000006056000-memory.dmp
      Filesize

      408KB

    • memory/1532-144-0x0000000006830000-0x00000000069F2000-memory.dmp
      Filesize

      1.8MB

    • memory/1532-145-0x0000000006A30000-0x0000000006F5C000-memory.dmp
      Filesize

      5.2MB

    • memory/1532-146-0x000000000076D000-0x0000000000798000-memory.dmp
      Filesize

      172KB

    • memory/1532-147-0x00000000021F0000-0x0000000002228000-memory.dmp
      Filesize

      224KB

    • memory/1532-148-0x000000000076D000-0x0000000000798000-memory.dmp
      Filesize

      172KB

    • memory/1532-149-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB