Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2023 14:47

General

  • Target

    da8de9df8f38e52af350b23f444a7b0becc91a66b3beb3de141c535835e401ad.exe

  • Size

    1.3MB

  • MD5

    f2c81708b610722d5d6673cf8657373c

  • SHA1

    6d962f9052eb02e0a06eee4a77d22f3c570143d2

  • SHA256

    da8de9df8f38e52af350b23f444a7b0becc91a66b3beb3de141c535835e401ad

  • SHA512

    396f1001bf6ec2e53851c30ab8918e3698ba39352da91eeffe7f81c195ff5bf0aaf90f6cefdb865172cc161c6d4905abdd2163c782fd35f8fc79fa67ebed4b5f

  • SSDEEP

    24576:mbvZOdTHWDUXG3Z00bchJcqwtBXdMzgcZZDSQiiV3bJ7:gs5WoW3Z0wgK/xdMvZx3V7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da8de9df8f38e52af350b23f444a7b0becc91a66b3beb3de141c535835e401ad.exe
    "C:\Users\Admin\AppData\Local\Temp\da8de9df8f38e52af350b23f444a7b0becc91a66b3beb3de141c535835e401ad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2072 -s 888
      2⤵
      • Program crash
      PID:2940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-54-0x00000000002E0000-0x000000000031E000-memory.dmp

    Filesize

    248KB

  • memory/2072-55-0x000007FEF6010000-0x000007FEF69FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-56-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-57-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-58-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-59-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-60-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-64-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-65-0x000007FEF6010000-0x000007FEF69FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-66-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-67-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-68-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-69-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-70-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB

  • memory/2072-71-0x0000000000260000-0x00000000002E0000-memory.dmp

    Filesize

    512KB