Analysis

  • max time kernel
    178s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2022, 00:18

General

  • Target

    94baf7cfc078b41cbcaeef7e2621f800f790ff48ff1177b3133f6ac02365cf5a.exe

  • Size

    30KB

  • MD5

    01838ee9656c77f3f4c37b1709a3715f

  • SHA1

    2d7652fdc0c88cbddeb227a8afce06a1c9a0fb06

  • SHA256

    94baf7cfc078b41cbcaeef7e2621f800f790ff48ff1177b3133f6ac02365cf5a

  • SHA512

    5db9a01598209e1dd55a987b6b0b84ec3fa57b1d4c9415e20dff141d9c01871c04149f0243568a979d30f4033367116c5cc4ffd2b69b3e7fb0ade4c7f3f7cb45

  • SSDEEP

    768:wz/VeR1418nkesi4bxhbA6lvEWrvpnbcuyD7Ubqc:wpeg18nenbAi9vpnouy8+c

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94baf7cfc078b41cbcaeef7e2621f800f790ff48ff1177b3133f6ac02365cf5a.exe
    "C:\Users\Admin\AppData\Local\Temp\94baf7cfc078b41cbcaeef7e2621f800f790ff48ff1177b3133f6ac02365cf5a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 272
      2⤵
      • Program crash
      PID:1508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4412 -ip 4412
    1⤵
      PID:1892

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4412-132-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB