Analysis

  • max time kernel
    27s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 20:22

General

  • Target

    challange_Benign_d33bf2d3e57e66002232f3cc91a899708e46cd51f855702c8410db357dfc123b.exe

  • Size

    60KB

  • MD5

    803f73d62a2fceb2df8df45e0eefd7f5

  • SHA1

    ab1d54d77e28741058e24ff368bf12db82fb448a

  • SHA256

    d33bf2d3e57e66002232f3cc91a899708e46cd51f855702c8410db357dfc123b

  • SHA512

    97a2578dc2002479372792b999613600c341f3a0ac6f901e3809e443e5c4a5a8033e15034ad04967dcf30596427da63828232d73630963c9d7387cf60660b33e

  • SSDEEP

    768:TqUMu52FUlBVrwo2YCRjqKv/R7cAI6tIyiKeY6GVrBQje25xEI:TqRu52ilBNB+jqtByilGTQn5xb

Score
1/10

Malware Config

Signatures

  • Modifies registry class 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\challange_Benign_d33bf2d3e57e66002232f3cc91a899708e46cd51f855702c8410db357dfc123b.exe
    "C:\Users\Admin\AppData\Local\Temp\challange_Benign_d33bf2d3e57e66002232f3cc91a899708e46cd51f855702c8410db357dfc123b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:316

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/316-54-0x0000000000E40000-0x0000000000E48000-memory.dmp

          Filesize

          32KB

        • memory/316-55-0x000000001B140000-0x000000001B1C0000-memory.dmp

          Filesize

          512KB

        • memory/316-56-0x000000001B140000-0x000000001B1C0000-memory.dmp

          Filesize

          512KB