Analysis

  • max time kernel
    87s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 16:55

General

  • Target

    0x000600000001ace8-206.exe

  • Size

    7.1MB

  • MD5

    0770b122545119afb2c4e87a2b6732ef

  • SHA1

    d644fb9b8fead525dae31c75ad58afff3d90e33d

  • SHA256

    6b2b4ba436ffb3f5cb5872a1c590c8504a26a2d003cb872313fc722222ea6cc6

  • SHA512

    fd1660b22b04656f9b87dccf1b130da356557aacca34ef19472a4a79ac28330ff2b55427f7062c32a71e642417e2eb64d2edced80c48d0d4001c0905b1d3ae37

  • SSDEEP

    196608:TwH8E5+Itu+2TzWI1CSfMqvCQoQvySRBJ:TwcQ+egoWv9vySRT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000600000001ace8-206.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000600000001ace8-206.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1112

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\dc1a346e22544b9a88c270d74454b40c\WebView2Loader.dll

          Filesize

          107KB

          MD5

          0fc6f5b0b3babdf352024844d2a756d5

          SHA1

          1b58e7c0ff1d1cd83d9aed80c8d75d8bc2b163e8

          SHA256

          77a2a3097c0af6e884d2f7643dfe38094453309dd2433c33730fca10a0477411

          SHA512

          81942fe24fdb0977ffc4e19046af49cdb3cfd4660d75a4e8f5a5db399275c9641a2615bf01c94b74fed044730144b0969160a2eaccf274ee4aae6c595e5abe15

        • memory/1112-54-0x0000000001070000-0x0000000001784000-memory.dmp

          Filesize

          7.1MB

        • memory/1112-56-0x0000000075891000-0x0000000075893000-memory.dmp

          Filesize

          8KB

        • memory/1112-57-0x00000000054D0000-0x00000000058D4000-memory.dmp

          Filesize

          4.0MB

        • memory/1112-58-0x00000000005C0000-0x00000000005DA000-memory.dmp

          Filesize

          104KB

        • memory/1112-59-0x00000000058D0000-0x0000000005982000-memory.dmp

          Filesize

          712KB

        • memory/1112-60-0x00000000005F0000-0x00000000005FA000-memory.dmp

          Filesize

          40KB