Analysis

  • max time kernel
    46s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2023 01:31

General

  • Target

    3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe

  • Size

    1.1MB

  • MD5

    8771e4a71d08e5d647aca2d9a4e78640

  • SHA1

    2149e01eed4f4d77cfac17c2921de59b1590ddde

  • SHA256

    3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644

  • SHA512

    3b581ec531d386e5b9c1e35b26d50b7a4016128593cd8ba8c8fdc08ef0ffd255f0c6164e6c03e39a98695ee9861fe7d68db4664c659f2e330a49b14fd10d9c81

  • SSDEEP

    12288:JlMOEAlI3MzSSV93jHFoMqP8zBnx1FQEGFm4l2WViumw1uFR7r/mYQf3mV7eK8qy:JCYdSSXFtdx12PF9ltViIuFZmbPcuq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
    "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
      "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
      2⤵
        PID:1496
      • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
        "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
        2⤵
          PID:1304
        • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
          "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
          2⤵
            PID:1424
          • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
            "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
            2⤵
              PID:1604
            • C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe
              "C:\Users\Admin\AppData\Local\Temp\3d0f9f89293300e70a0a0c37c5aab81be9ed97a7ec4a2f5a73e54767d4aed644.exe"
              2⤵
                PID:1420

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1528-54-0x0000000000350000-0x0000000000478000-memory.dmp
              Filesize

              1.2MB

            • memory/1528-55-0x00000000005C0000-0x00000000005DA000-memory.dmp
              Filesize

              104KB

            • memory/1528-56-0x0000000004620000-0x0000000004660000-memory.dmp
              Filesize

              256KB

            • memory/1528-57-0x0000000004620000-0x0000000004660000-memory.dmp
              Filesize

              256KB

            • memory/1528-58-0x0000000000560000-0x000000000056C000-memory.dmp
              Filesize

              48KB

            • memory/1528-59-0x00000000050F0000-0x0000000005190000-memory.dmp
              Filesize

              640KB

            • memory/1528-60-0x0000000001FE0000-0x0000000001FE6000-memory.dmp
              Filesize

              24KB

            • memory/1528-61-0x00000000022E0000-0x0000000002314000-memory.dmp
              Filesize

              208KB