Analysis
-
max time kernel
55s -
max time network
182s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/03/2023, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe
Resource
win10-20230220-en
General
-
Target
130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe
-
Size
607KB
-
MD5
5ce9e94045006f90dc0fa07fdc831206
-
SHA1
702c73867c9b949a63b23a9505cc92e14652d0e0
-
SHA256
130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579
-
SHA512
ca35a32125da9eefa38c89bf60ef4bd639bb89146194aa8ebf5dfaabc7594438564af4e237fae7c5df93bbd2f65ce43532c055d78435e02fd5279159352bab9a
-
SSDEEP
12288:kSEkZoqKzoDGNdq+OXCY2w0r2Hh0HvLvFSwt:kzkZeaQcDXCYH0AmPbFj
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4184 2304 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4532 powershell.exe 4532 powershell.exe 4532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2304 130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeIncreaseQuotaPrivilege 4532 powershell.exe Token: SeSecurityPrivilege 4532 powershell.exe Token: SeTakeOwnershipPrivilege 4532 powershell.exe Token: SeLoadDriverPrivilege 4532 powershell.exe Token: SeSystemProfilePrivilege 4532 powershell.exe Token: SeSystemtimePrivilege 4532 powershell.exe Token: SeProfSingleProcessPrivilege 4532 powershell.exe Token: SeIncBasePriorityPrivilege 4532 powershell.exe Token: SeCreatePagefilePrivilege 4532 powershell.exe Token: SeBackupPrivilege 4532 powershell.exe Token: SeRestorePrivilege 4532 powershell.exe Token: SeShutdownPrivilege 4532 powershell.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeSystemEnvironmentPrivilege 4532 powershell.exe Token: SeRemoteShutdownPrivilege 4532 powershell.exe Token: SeUndockPrivilege 4532 powershell.exe Token: SeManageVolumePrivilege 4532 powershell.exe Token: 33 4532 powershell.exe Token: 34 4532 powershell.exe Token: 35 4532 powershell.exe Token: 36 4532 powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe"C:\Users\Admin\AppData\Local\Temp\130a4a54a844e949bcc467e90fd705f966fc536f0ec71e74b6e784a6d2f1f579.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 12962⤵
- Program crash
PID:4184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a