Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2023, 20:57

General

  • Target

    876c0dc4b8efd696b4c57191d033589a86f5901aacb15bb5f72110e85b35bd50.exe

  • Size

    1.3MB

  • MD5

    446f7c1a22434dff77b226195f79c0ce

  • SHA1

    971e00ab8c87010406cdf07259bfe45b5eb2e5c4

  • SHA256

    876c0dc4b8efd696b4c57191d033589a86f5901aacb15bb5f72110e85b35bd50

  • SHA512

    be5c556b8a56bd03f97bb2d64ac0564064652c4a00822eb8d6a0cdce7c036c94ea1ba1e32eb926877987f29903ef9869270bc06852e6dd7ee839197010e0438d

  • SSDEEP

    24576:oTV9C3TTLXRwcfrlKDm1G09Vc7GK+z/rhPV5HhL:oGlKDK9Vt/z/VPV3

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\876c0dc4b8efd696b4c57191d033589a86f5901aacb15bb5f72110e85b35bd50.exe
    "C:\Users\Admin\AppData\Local\Temp\876c0dc4b8efd696b4c57191d033589a86f5901aacb15bb5f72110e85b35bd50.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 744
      2⤵
      • Program crash
      PID:1620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 2032
      2⤵
      • Program crash
      PID:956
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 748 -ip 748
    1⤵
      PID:4832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 748 -ip 748
      1⤵
        PID:3084

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Jnns.Config

              Filesize

              2KB

              MD5

              37d1c0616a00bb67600294c9def89d35

              SHA1

              b26f806d82a012c0aa50778143f90adf8dfd735d

              SHA256

              a488486bd67d2bbc55469634774790d22a623407337377846721daa5e36899f0

              SHA512

              875b3b0662d8a22fe3f6bed9fc172f68aefa4009581d7c1f8f7027ce3926792faa9fde3d1d796d7f34b90f278df2bfa13acac0238798839b0cbb5586d05472f3