Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:40

General

  • Target

    f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609.exe

  • Size

    84KB

  • MD5

    5fe06b9db2e3734cc4659823ea8d6621

  • SHA1

    778fc46f4ea8dc54f248a6532ddb33cb7f16e795

  • SHA256

    f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609

  • SHA512

    76049c0fd3889f31f0dbd4f8d56be06a7dc865b0ef3ab57ca32086d2a0e01494ccc829ee93e8504a583c4eca35f6cc2ee202d7e1e141db20847c5cb5fed686ae

  • SSDEEP

    768:w4HZYcwZ1aCrnZJY6c96vi79xRkNiQNlfPnw4abyxIwQW10oIxE08o4tDGkCT93s:XUrnzj019zkNT3qyGW10NKo4tDGkQiz

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609.exe
    "C:\Users\Admin\AppData\Local\Temp\f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609.exe
      "C:\Users\Admin\AppData\Local\Temp\f799d4469558864df768573912b3bfb22e110e5c85880d4aca5b3dcc7ab31609.exe"
      2⤵
      • Adds Run key to start application
      PID:1724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1724-54-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-55-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-57-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-59-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-60-0x0000000000407E96-mapping.dmp

  • memory/1724-58-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1724-63-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB