Analysis

  • max time kernel
    47s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2022 02:03

General

  • Target

    C4Loader.exe

  • Size

    2.7MB

  • MD5

    43a0526a928f9daca9c953221406af8e

  • SHA1

    34fdd0d94ecfe8c887ebb164068579013d2c611b

  • SHA256

    88e1fbd4e5494e3c2766300e8bab97edb08f3c7315c3d914b7d8b2dac25f8986

  • SHA512

    9632a96172d6db2d7b0e356a2bb661b397b3c8b380fbe151707322d204cee0ab82abbec4476ce6e43f5dfa67b9ae34d77909fbc966d431898b25dec9fbaea3fd

  • SSDEEP

    49152:Aujo4zjmiVP/bjTRdYey8Pg8clh2bsam8LFl6yJ3O21oV9aZYq:Auc2milfTTYZ8PM756l6y5Bo6qq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1940-54-0x00000000011C0000-0x0000000001474000-memory.dmp

    Filesize

    2.7MB

  • memory/1940-55-0x0000000004E30000-0x0000000004F92000-memory.dmp

    Filesize

    1.4MB

  • memory/1940-56-0x00000000759E1000-0x00000000759E3000-memory.dmp

    Filesize

    8KB

  • memory/1940-57-0x0000000004F90000-0x00000000050DE000-memory.dmp

    Filesize

    1.3MB

  • memory/1940-58-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

    Filesize

    80KB

  • memory/1940-59-0x0000000001175000-0x0000000001186000-memory.dmp

    Filesize

    68KB

  • memory/1940-60-0x0000000001070000-0x0000000001086000-memory.dmp

    Filesize

    88KB

  • memory/1940-61-0x0000000001090000-0x00000000010B0000-memory.dmp

    Filesize

    128KB