Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2023 01:13

General

  • Target

    02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670.exe

  • Size

    365KB

  • MD5

    319e413d3208e2f20e72d3c0150ccbe4

  • SHA1

    036c72d7aef21caecf0401ee7da132d2a56533ef

  • SHA256

    02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670

  • SHA512

    a23af17d029bd60e0bac7034e6e4b60f5999a741b560c1f61fe9748983b0d612b0b0d4cd642a80501406c2b21614a75908a0e387857a06fbbf15663f78b1cc67

  • SSDEEP

    6144:iBe73lX4CEB/eeXvYPbluzFOIs2niR1tJk+uPUYJBnMI:ce7VyXvYPblDh2EXkRBj

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670.exe
    "C:\Users\Admin\AppData\Local\Temp\02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:1104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1104-133-0x00000000005B0000-0x0000000000612000-memory.dmp

    Filesize

    392KB

  • memory/1104-134-0x00007FF900950000-0x00007FF901411000-memory.dmp

    Filesize

    10.8MB

  • memory/1104-135-0x000000001B220000-0x000000001B230000-memory.dmp

    Filesize

    64KB

  • memory/1104-136-0x00007FF900950000-0x00007FF901411000-memory.dmp

    Filesize

    10.8MB

  • memory/1104-137-0x000000001B220000-0x000000001B230000-memory.dmp

    Filesize

    64KB