Analysis

  • max time kernel
    44s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 05:08

General

  • Target

    64617a1db0f248856dcd6842033398907fdd2482d17622883b9390c6714d2f6a.exe

  • Size

    120KB

  • MD5

    67c49c54e0568270925545144f7babe0

  • SHA1

    623d6647ab5de1651c15728e6a90a47eee943543

  • SHA256

    64617a1db0f248856dcd6842033398907fdd2482d17622883b9390c6714d2f6a

  • SHA512

    8078d3544ec72ad0f8140ec120c2512bb7f1b4ba9c2cb35c954c31c14ad7a3fd6414928b2dc00dbc4172274fe55595fc0a5f1117a026029acd438ce3e4716153

  • SSDEEP

    3072:CZfYznexZKRQNLXt/cA3rwaTfAe4v2aSCSJh2aS:CtyexZDBJcA37/tg

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64617a1db0f248856dcd6842033398907fdd2482d17622883b9390c6714d2f6a.exe
    "C:\Users\Admin\AppData\Local\Temp\64617a1db0f248856dcd6842033398907fdd2482d17622883b9390c6714d2f6a.exe"
    1⤵
    • Enumerates connected drives
    PID:1492
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x568
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1152

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1492-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

          Filesize

          8KB