Analysis

  • max time kernel
    40s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 17:35

General

  • Target

    e84314bd8e6d16c5f759c5295b1561fa9c000cb3ee594dfa7b6dcc4fb4abb28d.exe

  • Size

    502KB

  • MD5

    e9aacff08be163162dd01acaf2fe9e76

  • SHA1

    430d77ec921c55bb03fd37716b96aee6992393df

  • SHA256

    e84314bd8e6d16c5f759c5295b1561fa9c000cb3ee594dfa7b6dcc4fb4abb28d

  • SHA512

    585c135c010766acf261c4db360bbc6f0625df4cbfb6b67edc0334fea625949e1568f9241f7dc3bcca2a6b2f2ce4b87215200b89cde42c74698be581bfe12853

  • SSDEEP

    6144:vwpJeUzgDpp405g9D2SEu5901EpH+K3mME48D/QV07zvnNeMwt:YpJD8DppJ5gEijxpC44O0H1eDt

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e84314bd8e6d16c5f759c5295b1561fa9c000cb3ee594dfa7b6dcc4fb4abb28d.exe
    "C:\Users\Admin\AppData\Local\Temp\e84314bd8e6d16c5f759c5295b1561fa9c000cb3ee594dfa7b6dcc4fb4abb28d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4492

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\FigeyGupne\FigeyGupne.dat

    Filesize

    276KB

    MD5

    9f377051e601536bcaa0afcf611210e8

    SHA1

    acdf08c2913652d3b4dafd776c8e2ede524d527d

    SHA256

    e553b2f14c570fe458201284498ab5d78cbc7ca0dbaee7be322abdcde9868cbc

    SHA512

    ac79ce3ec7a128c4333122a00d85a828bfad4e895fce3719ee43f4d3379351cde9f2d42be3b4297e5ff6e99fd2178b9a68569ab21d5f9ade0b354e59cb08afe3

  • memory/4492-132-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4492-133-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/4492-136-0x0000000010000000-0x000000001006E000-memory.dmp

    Filesize

    440KB

  • memory/4492-137-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB