Analysis

  • max time kernel
    119s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 01:29

General

  • Target

    93b32d7a4bf377f4fbe765ca2f200d32c20582645c0e5b301c34b4e1bf0fc808.exe

  • Size

    21KB

  • MD5

    0cacf0cd8194d0fb0ee05ef61c6ec8e6

  • SHA1

    3f5ea8db92a97bef4eb88bd5ddd37de66b778064

  • SHA256

    93b32d7a4bf377f4fbe765ca2f200d32c20582645c0e5b301c34b4e1bf0fc808

  • SHA512

    815cc21a95a49a4d6213e55cf28f10abdaabfa240c29342f63af7378f77323ab92868ff7011c67c37001c7e9b38a57c4f4391897074925552b8c5cbeec5fbe8b

  • SSDEEP

    192:I+5v70v8bv0Pg7ltOsK0qZNJYdmO55ZDc8RwcUI9RQUy8O6D24bx/mQ0/0:I+V7Q8DZHKZyf5G87r9mUf24bxus

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1296
      • C:\Users\Admin\AppData\Local\Temp\93b32d7a4bf377f4fbe765ca2f200d32c20582645c0e5b301c34b4e1bf0fc808.exe
        "C:\Users\Admin\AppData\Local\Temp\93b32d7a4bf377f4fbe765ca2f200d32c20582645c0e5b301c34b4e1bf0fc808.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1968-54-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/1968-55-0x0000000075141000-0x0000000075143000-memory.dmp

      Filesize

      8KB