Analysis

  • max time kernel
    41s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:22

Errors

Reason
Reading agent response: read tcp 10.127.0.1:36732->10.127.0.60:8000: read: connection reset by peer

General

  • Target

    a4bd10ac7e47dc568574f9ed0df6a1184174942ebe02efe6e9bbd27e399cc10c.exe

  • Size

    100KB

  • MD5

    6e23f0bab78a1d2979b7e00cace378e2

  • SHA1

    2d89916df02bdfaa2aaad1efa30c72471684594e

  • SHA256

    a4bd10ac7e47dc568574f9ed0df6a1184174942ebe02efe6e9bbd27e399cc10c

  • SHA512

    8e718e10bcc752a223a244cd793191fc3b388de1b1ba7284b19b8f8541c942c3401d4c4827ae5dc6cafe588d6f8d7567c33df32f72cbdeb3a9bc936d8a4e84ec

  • SSDEEP

    3072:35z5qT5XSwkKXzPcdlnfdHRFY4HhgsteoMJlId:35z525kKXz0nnfdHRNHB0Id

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4bd10ac7e47dc568574f9ed0df6a1184174942ebe02efe6e9bbd27e399cc10c.exe
    "C:\Users\Admin\AppData\Local\Temp\a4bd10ac7e47dc568574f9ed0df6a1184174942ebe02efe6e9bbd27e399cc10c.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:528
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/528-54-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB

    • memory/528-55-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

      Filesize

      8KB

    • memory/528-56-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB

    • memory/1520-57-0x000007FEFC201000-0x000007FEFC203000-memory.dmp

      Filesize

      8KB