Overview
overview
10Static
static
324192519fe...d9.exe
windows7-x64
124192519fe...d9.exe
windows10-2004-x64
74da95447ef...97.exe
windows7-x64
14da95447ef...97.exe
windows10-2004-x64
37d9ee189fe...2b.exe
windows7-x64
17d9ee189fe...2b.exe
windows10-2004-x64
3aa682ef8ad...47.exe
windows7-x64
7aa682ef8ad...47.exe
windows10-2004-x64
10df37a01547...a5.exe
windows7-x64
1df37a01547...a5.exe
windows10-2004-x64
7efe1804b12...e3.exe
windows7-x64
7efe1804b12...e3.exe
windows10-2004-x64
7Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 11:22
Behavioral task
behavioral1
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
24192519fe48742134f892876e8754d9.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
4da95447ef335d683699e9ba3f352797.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
7d9ee189fe6bcd4d1dc07ba570684e2b.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
aa682ef8adea6576fcbdd35c69c7be47.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
df37a01547bcba1097616ca2da4fd2a5.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
efe1804b12286c2f920959073f6267e3.exe
Resource
win10v2004-20230220-en
General
-
Target
4da95447ef335d683699e9ba3f352797.exe
-
Size
1.2MB
-
MD5
4da95447ef335d683699e9ba3f352797
-
SHA1
8e15f95f54e72f619859284f637dc8a5312aa2d7
-
SHA256
de36087644980290e7ee80cadc86705230536ff8ad143542323086d5f0338d52
-
SHA512
9cc91ba7ba111e48efab962e71f2e4f8f704fee707f5cebd89d07a4066b4e06aff031f62c38ca7d6cf44a3aeaef22f750b042b6f354dff3a631a971de4b106e0
-
SSDEEP
24576:LIky4/3X2JcF2jYAF5e2O+f4GC0Nnve511GAsu0Y09OJH:84PYOz3fJ
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4948 1692 WerFault.exe 4da95447ef335d683699e9ba3f352797.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
4da95447ef335d683699e9ba3f352797.exedescription pid process Token: SeIncreaseQuotaPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeSecurityPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeTakeOwnershipPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeLoadDriverPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeSystemProfilePrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeSystemtimePrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeProfSingleProcessPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeIncBasePriorityPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeCreatePagefilePrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeBackupPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeRestorePrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeShutdownPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeDebugPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeSystemEnvironmentPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeRemoteShutdownPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeUndockPrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: SeManageVolumePrivilege 1692 4da95447ef335d683699e9ba3f352797.exe Token: 33 1692 4da95447ef335d683699e9ba3f352797.exe Token: 34 1692 4da95447ef335d683699e9ba3f352797.exe Token: 35 1692 4da95447ef335d683699e9ba3f352797.exe Token: 36 1692 4da95447ef335d683699e9ba3f352797.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4da95447ef335d683699e9ba3f352797.exe"C:\Users\Admin\AppData\Local\Temp\4da95447ef335d683699e9ba3f352797.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1692 -s 12242⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 1692 -ip 16921⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1692-133-0x00000173C1820000-0x00000173C1841000-memory.dmpFilesize
132KB
-
memory/1692-134-0x00000173C3230000-0x00000173C3240000-memory.dmpFilesize
64KB
-
memory/1692-135-0x00000173C3230000-0x00000173C3240000-memory.dmpFilesize
64KB
-
memory/1692-136-0x00000173C3230000-0x00000173C3240000-memory.dmpFilesize
64KB
-
memory/1692-137-0x00000173C3230000-0x00000173C3240000-memory.dmpFilesize
64KB
-
memory/1692-138-0x00000173C3230000-0x00000173C3240000-memory.dmpFilesize
64KB