Analysis

  • max time kernel
    170s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 13:05

General

  • Target

    e7a3651b2f6b64c898b89fa0ff11989b54360fee02849def589be6799d641798.exe

  • Size

    200KB

  • MD5

    0e209fec9d3d2ba3b3c891402f51ac42

  • SHA1

    27c67f16c0f4c07ed91e7896869317ed730905db

  • SHA256

    e7a3651b2f6b64c898b89fa0ff11989b54360fee02849def589be6799d641798

  • SHA512

    6479b638aa9f71d2352780b0ea07238c4c31ba68b7764d011b940f6a8ac3cde68dd6f83d924fe39842cc22952f67e063837dbbfe7480e44d4720eb3b70118c19

  • SSDEEP

    3072:9TAR0q0dWtU1loSoaiYuaURh1MgMBNQM5gGu36LVBHz9Y8gGM4Aq/GkE9B+kMsGg:IL0Um1lopYuxWBz5MKjzSGw9IkErXOf

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a3651b2f6b64c898b89fa0ff11989b54360fee02849def589be6799d641798.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a3651b2f6b64c898b89fa0ff11989b54360fee02849def589be6799d641798.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4300
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 548
      2⤵
      • Program crash
      PID:4948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4300 -ip 4300
    1⤵
      PID:520

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4300-134-0x0000000000401000-0x0000000000410000-memory.dmp

            Filesize

            60KB

          • memory/4300-133-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4300-132-0x00000000004E0000-0x0000000000505000-memory.dmp

            Filesize

            148KB

          • memory/4300-135-0x0000000000410000-0x0000000000420000-memory.dmp

            Filesize

            64KB

          • memory/4300-137-0x0000000000410000-0x0000000000412000-memory.dmp

            Filesize

            8KB

          • memory/4300-138-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB

          • memory/4300-139-0x0000000000410000-0x0000000000420000-memory.dmp

            Filesize

            64KB