Analysis

  • max time kernel
    60s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2022 23:13

General

  • Target

    file.exe

  • Size

    442KB

  • MD5

    885d38e615f69fe3ca5aa15a247a0038

  • SHA1

    c94740edb8b0e1eaae1be8bb613376ade74600c3

  • SHA256

    1c74605c75bd8e876ec7dafd8b9c575e0ec314091cb398ce2257b003aa329bdc

  • SHA512

    e466cc6bfb31e5a74738116e52f8a6f280b0882f6e17581798b2515c0a41838d4d62a3a8748a0b235147f586df1829d2c5cc63e5fe1861d8655e946e532100de

  • SSDEEP

    6144:n/TLXVTsXbcFgLfkivVO8tmLTNdhASQRVOoNS8fW3NeIH0p7ITsq:n/TDVTsXImLfNOfLGVVHNS80NP0p7

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 1260
      2⤵
      • Program crash
      PID:3996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3108 -ip 3108
    1⤵
      PID:2328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3108-132-0x0000000007550000-0x0000000007AF4000-memory.dmp

      Filesize

      5.6MB

    • memory/3108-133-0x0000000002EB9000-0x0000000002EEC000-memory.dmp

      Filesize

      204KB

    • memory/3108-134-0x0000000004850000-0x00000000048BE000-memory.dmp

      Filesize

      440KB

    • memory/3108-135-0x0000000007B00000-0x0000000008118000-memory.dmp

      Filesize

      6.1MB

    • memory/3108-136-0x0000000007470000-0x0000000007482000-memory.dmp

      Filesize

      72KB

    • memory/3108-137-0x0000000008120000-0x000000000822A000-memory.dmp

      Filesize

      1.0MB

    • memory/3108-138-0x0000000000400000-0x0000000002C5D000-memory.dmp

      Filesize

      40.4MB

    • memory/3108-139-0x0000000007490000-0x00000000074CC000-memory.dmp

      Filesize

      240KB

    • memory/3108-140-0x0000000008490000-0x0000000008522000-memory.dmp

      Filesize

      584KB

    • memory/3108-141-0x0000000008530000-0x0000000008596000-memory.dmp

      Filesize

      408KB

    • memory/3108-142-0x0000000008C10000-0x0000000008C86000-memory.dmp

      Filesize

      472KB

    • memory/3108-143-0x0000000008CD0000-0x0000000008CEE000-memory.dmp

      Filesize

      120KB

    • memory/3108-144-0x0000000008E90000-0x0000000009052000-memory.dmp

      Filesize

      1.8MB

    • memory/3108-145-0x0000000009070000-0x000000000959C000-memory.dmp

      Filesize

      5.2MB

    • memory/3108-146-0x0000000002EB9000-0x0000000002EEC000-memory.dmp

      Filesize

      204KB

    • memory/3108-147-0x0000000000400000-0x0000000002C5D000-memory.dmp

      Filesize

      40.4MB