Analysis

  • max time kernel
    27s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2023, 01:29

General

  • Target

    CapCut_1_4_0_198_capcutpc_0.exe

  • Size

    381.5MB

  • MD5

    53aa6fa78013969573a659c6e24c803d

  • SHA1

    65290e1d5178376267223458e8bdc43609fc8cb8

  • SHA256

    28ed406c9ee382e6754a2adb72e968ae1a04d88ca4d3dd38d146bbc34c670bdc

  • SHA512

    8349a9e2617e72f736e9efce0f9cd537e6391218a9849aef8ae34f1ad23ff6693047d8376734bf6f25214b3fb14d9e54eb195e0c3637a23d68760099cb2d806a

  • SSDEEP

    6291456:/xbvoEajwaYuBThQnOCfTpvlPSU16A+GRxkU1J4SId/r3QS3acoAXgef6SxQaA0v:/xKcWTmO4TpvP19vkUD4SIdT3vnNf6sL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CapCut_1_4_0_198_capcutpc_0.exe
    "C:\Users\Admin\AppData\Local\Temp\CapCut_1_4_0_198_capcutpc_0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E9DDA433-AA83-40F3-BEA5-93BAD32DD698\7zip.dll

    Filesize

    738KB

    MD5

    358b71877f55342c5c49cb157bdf8e90

    SHA1

    68301536962ba74969f1ce36d9000ba078b5f79d

    SHA256

    5d6f46ec05ae05ea0e197a10292901f40c73ba5beaf32245d6689630f39fc798

    SHA512

    a153d2d804994c1cbc41d0a33a5bcc08ae2921468e4a41779dbb345b7d47b3628161a7639484f5931b6694a5a532346d1f8e93ca300be173ef760be3bb52e1a9

  • memory/272-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB