Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2023, 22:52

General

  • Target

    h9632979.exe

  • Size

    175KB

  • MD5

    2bd5e7d4045c325ceb436051b9c4729c

  • SHA1

    48d1338335c17c83b68a6e8f80730e1b583b85e8

  • SHA256

    5b0a8d133d02bb62127f562efc70f6c7c58afa82ec4427e8a5284ff4b4e110b9

  • SHA512

    ca24fa5cf926ff289999b86b37c05ed3784e5207bc69c6304146a5c90b920370603a9717a5c3fcd11c046d00a7970c2ba6219cc2c1b3cadc22a66075d16d57d9

  • SSDEEP

    3072:pDKW1LgppLRHMY0TBfJvjcTp5XZpa8nqeo7Qbeues6Y:pDKW1Lgbdl0TBBvjc/S81Sues

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\h9632979.exe
    "C:\Users\Admin\AppData\Local\Temp\h9632979.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1704-54-0x00000000004D0000-0x00000000004EA000-memory.dmp

    Filesize

    104KB

  • memory/1704-55-0x0000000001D80000-0x0000000001D98000-memory.dmp

    Filesize

    96KB

  • memory/1704-56-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-57-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-59-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-61-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-63-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-65-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-67-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-69-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-71-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-73-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-75-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-77-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-79-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-81-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-83-0x0000000001D80000-0x0000000001D92000-memory.dmp

    Filesize

    72KB

  • memory/1704-85-0x0000000004A40000-0x0000000004A80000-memory.dmp

    Filesize

    256KB

  • memory/1704-84-0x0000000004A40000-0x0000000004A80000-memory.dmp

    Filesize

    256KB