Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 20:16

General

  • Target

    518bfe4e00d4b4592f24866af66a79e4ce42e8653831d811aa421c0ab8a3a552.exe

  • Size

    63KB

  • MD5

    a3a526aebd0ccf5dbd0a4cc81e87b4b0

  • SHA1

    ed421411963681110fc91d3507088c84dfc0033b

  • SHA256

    518bfe4e00d4b4592f24866af66a79e4ce42e8653831d811aa421c0ab8a3a552

  • SHA512

    bc31fcb0d03cd66762219a1375c00784269b3d8d40c43524c1960cada5ccb022d0c080324ec90e5809f935383c3cd4fe4e360122bf77fefd557a1a791b56bc16

  • SSDEEP

    1536:FNxU+W+73uSpoo3e/8+dcr2ySWuGONyMtjh:NU+W+qNo3e9Sy/WuyMtjh

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\518bfe4e00d4b4592f24866af66a79e4ce42e8653831d811aa421c0ab8a3a552.exe
    "C:\Users\Admin\AppData\Local\Temp\518bfe4e00d4b4592f24866af66a79e4ce42e8653831d811aa421c0ab8a3a552.exe"
    1⤵
    • Sets file execution options in registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1600-54-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB