Analysis

  • max time kernel
    242s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 09:39

General

  • Target

    32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe

  • Size

    1.4MB

  • MD5

    e5a2f33bf1dcf4b148c6f5b8c7ce4787

  • SHA1

    737ba1592b57cb560ed7b39f4a1768aaa1cf6f95

  • SHA256

    32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d

  • SHA512

    04b2a8c0c555c86b8e89162640261d0145dcbb6099837ef5ca54674b2fabc96678c08031c76e048faf76b34fc55e8e3aba69aa4bd514e4af127777a8ae4e03f7

  • SSDEEP

    24576:pS2hmTmzlaucQl+FSx3/qhsdFTKrPiBSxiT2nUhtjQv53a5qPtSR:p1NX8F0H6iAxiThPQhq5qVSR

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe
    "C:\Users\Admin\AppData\Local\Temp\32d048522a0ac8757639b1ca64503e653ff3edeceaed7f7402c4636d066a9c6d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 676
      2⤵
      • Program crash
      PID:520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/976-54-0x00000000002A0000-0x0000000000400000-memory.dmp

    Filesize

    1.4MB

  • memory/976-55-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB

  • memory/976-56-0x0000000000820000-0x0000000000838000-memory.dmp

    Filesize

    96KB