Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 06:02

General

  • Target

    10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe

  • Size

    13KB

  • MD5

    c06e8fc8b2b9f21084980b8621f9a46d

  • SHA1

    94ad6eb6c6b4942d35314e46aff6aea303578157

  • SHA256

    10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69

  • SHA512

    1a34cd3d09de7a33c69490ff72c3e9032004d4f74996181fbbdff1650fe0a86f2619c4f16be981e135c20d21eac5d2474ed76263f4a122971ea9bf5399aea280

  • SSDEEP

    96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe
    "C:\Users\Admin\AppData\Local\Temp\10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3808

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3808-133-0x0000000000C70000-0x0000000000C7A000-memory.dmp
    Filesize

    40KB