Analysis

  • max time kernel
    177s
  • max time network
    204s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:10

General

  • Target

    3f41a22b380ee4e346f92fe49a1beca67574d361b84b45d83c73e3eeff559048.exe

  • Size

    22KB

  • MD5

    15dd9168303772aaa1b28ccff60ac7dd

  • SHA1

    76621ce9d1bbf4b3f73660d820820e78c42e9852

  • SHA256

    3f41a22b380ee4e346f92fe49a1beca67574d361b84b45d83c73e3eeff559048

  • SHA512

    9bd61cc4be8cf964fa8948924fed6e567a2a6d096de1fd6453ca70bff9eb2da601f3fe4611b71c01eebe5fde9762ea5ddeae1e72066e95a7badce92821411efe

  • SSDEEP

    384:RHIeNRoeq3wTM++VzxQr8EqaA/y24bxus:mGzqATM++VqYP/xgus

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\3f41a22b380ee4e346f92fe49a1beca67574d361b84b45d83c73e3eeff559048.exe
        "C:\Users\Admin\AppData\Local\Temp\3f41a22b380ee4e346f92fe49a1beca67574d361b84b45d83c73e3eeff559048.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1116-54-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/1116-55-0x0000000076381000-0x0000000076383000-memory.dmp

      Filesize

      8KB