Resubmissions

31/01/2023, 21:40

230131-1jhk5acd7z 5

31/01/2023, 21:36

230131-1gd5xscd7v 3

31/01/2023, 21:32

230131-1dzbpacd6y 5

Analysis

  • max time kernel
    46s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2023, 21:32

General

  • Target

    Microsoft Office Cracked.exe

  • Size

    715.3MB

  • MD5

    70c3d7f58bc5a960480117a7609e7d45

  • SHA1

    4d3b7617b99ec1ad0bf86a599daa7e5138d7939a

  • SHA256

    eb22dcbc6620bfbcb4746ae369eef59ba6c49d7f2d5cb87b5f8f12058a6cfa9e

  • SHA512

    238351368341cd63e93a47ea399e6226a6de702f5dddd053dd22e4ba382bb10b3f42d41c55660ce9c3fb8033cd4cba642710e5308840c9968cb106f45aa5ddc1

  • SSDEEP

    98304:+r/fQ+GX+PuArhlhCkBvJqKUIXn0OTLb6QgYbXpAXrN3LMg:+rnQ+4kDh95JjdnPTLb6QgQpaJ7M

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:896
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1544
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x488
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2004

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/896-57-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-56-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-59-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-61-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-62-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-65-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-67-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/896-68-0x0000000075A11000-0x0000000075A13000-memory.dmp

            Filesize

            8KB

          • memory/1544-69-0x000007FEFB631000-0x000007FEFB633000-memory.dmp

            Filesize

            8KB

          • memory/2040-54-0x0000000000B80000-0x0000000001990000-memory.dmp

            Filesize

            14.1MB

          • memory/2040-55-0x000000001BFB0000-0x000000001C20E000-memory.dmp

            Filesize

            2.4MB