Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 06:52

General

  • Target

    8a1bca4e997aaa9faf7ff7b5f5ea11de2d137fcfada4fe73c566e402208918bd.exe

  • Size

    1.3MB

  • MD5

    dc037642b391e02e8187f81077786f02

  • SHA1

    14dc5b8287409c1993239552c4decd0db67f96fe

  • SHA256

    8a1bca4e997aaa9faf7ff7b5f5ea11de2d137fcfada4fe73c566e402208918bd

  • SHA512

    e74a8dbac5b5ae732c409408d42213c98e7486b9d1b11bbcc9d377dcc71c69c3eb8cc03bad67ef4067cc194c6be3977d4599f3cbbef2478c1ac9fcb7910b1913

  • SSDEEP

    24576:gyguOCAl0tvEIW+wsDaQw6DDz3qRyPnmGfrnvVUKueY8RmneWtJw:gyVOC1tlasY6DwOBfrnvV7UeWt6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a1bca4e997aaa9faf7ff7b5f5ea11de2d137fcfada4fe73c566e402208918bd.exe
    "C:\Users\Admin\AppData\Local\Temp\8a1bca4e997aaa9faf7ff7b5f5ea11de2d137fcfada4fe73c566e402208918bd.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4928

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dpfr404u.whf\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • C:\Users\Admin\AppData\Local\Temp\dpfr404u.whf\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • C:\Users\Admin\AppData\Local\Temp\dpfr404u.whf\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • memory/4928-132-0x0000000075480000-0x0000000075A31000-memory.dmp

          Filesize

          5.7MB

        • memory/4928-136-0x0000000075480000-0x0000000075A31000-memory.dmp

          Filesize

          5.7MB