Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 03:00

General

  • Target

    a38bb5dcb502b06633c45067304954126591610ecaa2eac0e3f7f9efd406ede0.exe

  • Size

    29KB

  • MD5

    44ee5e88bae05812ceef79c31380960d

  • SHA1

    b740103e41a4bc02180bb8780bbd0bfb7e455ec7

  • SHA256

    a38bb5dcb502b06633c45067304954126591610ecaa2eac0e3f7f9efd406ede0

  • SHA512

    3997cc8723476696a6af19b0d1c73b50679c22e6f4b9fa606953a2336dc825c65631d476fffe8e4b94da275ffd6fd5f68b135323b251a65719da33b9e2ff6b47

  • SSDEEP

    192:ic5v+LzdPAOfPFufRIM0q7cYiAGWypjyTtfW4k9a+FeuHX1BdqhtlS9pLE0/0:icV+LzdsRIMoxKtfW4aa+Fe8clKs

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1384
      • C:\Users\Admin\AppData\Local\Temp\a38bb5dcb502b06633c45067304954126591610ecaa2eac0e3f7f9efd406ede0.exe
        "C:\Users\Admin\AppData\Local\Temp\a38bb5dcb502b06633c45067304954126591610ecaa2eac0e3f7f9efd406ede0.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1372

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1372-54-0x0000000075921000-0x0000000075923000-memory.dmp

      Filesize

      8KB