Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 09:40

General

  • Target

    73b44ba03849209b0462da03264ebc712e685e42398975b0596cb70254a691f1.exe

  • Size

    617KB

  • MD5

    5865bae19998e693f1817a6a9a5e0039

  • SHA1

    42e15927d3e1d1fa417ac0e51267de23ec9b2d2e

  • SHA256

    73b44ba03849209b0462da03264ebc712e685e42398975b0596cb70254a691f1

  • SHA512

    242f973698e9d13b9e9b869a28373ea55646e7e624336450ca8c7c0c4d2e463db4a428aa5f7604e0125e785f119065850d34534c46b2c68c8ff0788f476083f5

  • SSDEEP

    12288:KxGTvNd5+Y8O/ZTqcHXuHX8apI8cLb/J1NT1Yq:KxEd1Tm0XM8au5v7NT7

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 3 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b44ba03849209b0462da03264ebc712e685e42398975b0596cb70254a691f1.exe
    "C:\Users\Admin\AppData\Local\Temp\73b44ba03849209b0462da03264ebc712e685e42398975b0596cb70254a691f1.exe"
    1⤵
    • Modifies security service
    • Windows security bypass
    • Disables RegEdit via registry modification
    • Modifies Installed Components in the registry
    • Windows security modification
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/704-54-0x0000000074AD1000-0x0000000074AD3000-memory.dmp

    Filesize

    8KB