Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2022, 13:03

General

  • Target

    file.exe

  • Size

    405KB

  • MD5

    e160222e27328c5d2c25670f1d6dc68e

  • SHA1

    4b10fe89e21d590a24900005d67666ff97127a2f

  • SHA256

    8e90cdcc9297cffd12c3f4c6a2efbcb03edfc9232a6630e927df0f943ca08a47

  • SHA512

    4d9c084fc038d3cd1d48c0145511bc4f358d7596b3c42c947a8697d1fed1a0827c19c6cf6983a5a4711387b99232c877a1e236a2cc9a28515c272d6b66b18ffd

  • SSDEEP

    6144:Q9qDpk1V7frHjuwZ3y/wCmXjo9UlxLusYMBSs:Q9q1gViwxBWUzr18

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3712
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 1248
      2⤵
      • Program crash
      PID:5032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3712 -ip 3712
    1⤵
      PID:3108

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3712-132-0x0000000000A09000-0x0000000000A3D000-memory.dmp

      Filesize

      208KB

    • memory/3712-133-0x0000000002490000-0x00000000024FE000-memory.dmp

      Filesize

      440KB

    • memory/3712-134-0x0000000000400000-0x0000000000868000-memory.dmp

      Filesize

      4.4MB

    • memory/3712-135-0x0000000004FF0000-0x0000000005594000-memory.dmp

      Filesize

      5.6MB

    • memory/3712-136-0x00000000055A0000-0x0000000005BB8000-memory.dmp

      Filesize

      6.1MB

    • memory/3712-137-0x0000000005C60000-0x0000000005C72000-memory.dmp

      Filesize

      72KB

    • memory/3712-138-0x0000000005C80000-0x0000000005D8A000-memory.dmp

      Filesize

      1.0MB

    • memory/3712-139-0x0000000005DD0000-0x0000000005E0C000-memory.dmp

      Filesize

      240KB

    • memory/3712-140-0x00000000060A0000-0x0000000006132000-memory.dmp

      Filesize

      584KB

    • memory/3712-141-0x0000000006140000-0x00000000061A6000-memory.dmp

      Filesize

      408KB

    • memory/3712-142-0x0000000006940000-0x0000000006B02000-memory.dmp

      Filesize

      1.8MB

    • memory/3712-143-0x0000000006B30000-0x000000000705C000-memory.dmp

      Filesize

      5.2MB

    • memory/3712-144-0x0000000000A09000-0x0000000000A3D000-memory.dmp

      Filesize

      208KB

    • memory/3712-145-0x0000000000400000-0x0000000000868000-memory.dmp

      Filesize

      4.4MB

    • memory/3712-146-0x0000000007170000-0x00000000071E6000-memory.dmp

      Filesize

      472KB

    • memory/3712-147-0x0000000007250000-0x000000000726E000-memory.dmp

      Filesize

      120KB

    • memory/3712-148-0x0000000000A09000-0x0000000000A3D000-memory.dmp

      Filesize

      208KB

    • memory/3712-149-0x0000000000400000-0x0000000000868000-memory.dmp

      Filesize

      4.4MB