Resubmissions

21/08/2023, 05:11

230821-fvheaaba65 10

21/08/2023, 04:51

230821-fgvgpacf8z 10

Analysis

  • max time kernel
    134s
  • max time network
    271s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 05:11

General

  • Target

    p1011540.exe

  • Size

    273KB

  • MD5

    0588d468e4c6dd86cda7674568890dd3

  • SHA1

    89b73b24e107f2dabd3fb96d8de14ba79ff42e40

  • SHA256

    971cc5473cf69c9ffd02a66fae2b8f90fa1ed9149961024039074d5ec3d6b767

  • SHA512

    3652cff7f0b9348cbcb619611304f5a5505faab3eaf153034a5287595525b446cfae3aa5f16e702286dbd847b96ff6e8a5a3e8afb3c3d248210844e7b42d1e40

  • SSDEEP

    6144:xhhNIXLF0dghXwnt6/rGtfFMtA7w/2ozTeso2P:pNIXx06twna6ttz/4Z

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\p1011540.exe
    "C:\Users\Admin\AppData\Local\Temp\p1011540.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 944
      2⤵
      • Program crash
      PID:4404
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4228 -ip 4228
    1⤵
      PID:4332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4228-133-0x0000000001A70000-0x0000000001A91000-memory.dmp

      Filesize

      132KB

    • memory/4228-134-0x0000000001AA0000-0x0000000001ACF000-memory.dmp

      Filesize

      188KB

    • memory/4228-135-0x0000000000400000-0x00000000018C1000-memory.dmp

      Filesize

      20.8MB

    • memory/4228-136-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/4228-138-0x0000000003AE0000-0x0000000003AF0000-memory.dmp

      Filesize

      64KB

    • memory/4228-139-0x0000000003AE0000-0x0000000003AF0000-memory.dmp

      Filesize

      64KB

    • memory/4228-137-0x00000000060B0000-0x0000000006654000-memory.dmp

      Filesize

      5.6MB

    • memory/4228-140-0x0000000003AE0000-0x0000000003AF0000-memory.dmp

      Filesize

      64KB

    • memory/4228-141-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-142-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-144-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-146-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-148-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-150-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-152-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-154-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-156-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-158-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-160-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-162-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-164-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-166-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-168-0x0000000003A20000-0x0000000003A36000-memory.dmp

      Filesize

      88KB

    • memory/4228-169-0x0000000001A70000-0x0000000001A91000-memory.dmp

      Filesize

      132KB

    • memory/4228-170-0x0000000000400000-0x00000000018C1000-memory.dmp

      Filesize

      20.8MB

    • memory/4228-171-0x0000000001AA0000-0x0000000001ACF000-memory.dmp

      Filesize

      188KB

    • memory/4228-172-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB

    • memory/4228-173-0x0000000003AE0000-0x0000000003AF0000-memory.dmp

      Filesize

      64KB

    • memory/4228-174-0x0000000003AE0000-0x0000000003AF0000-memory.dmp

      Filesize

      64KB

    • memory/4228-176-0x0000000000400000-0x00000000018C1000-memory.dmp

      Filesize

      20.8MB

    • memory/4228-177-0x0000000075180000-0x0000000075930000-memory.dmp

      Filesize

      7.7MB