Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 15:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
3 signatures
300 seconds
General
-
Target
f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe
-
Size
168KB
-
MD5
af9752b5badcb2c8f228fa4df4d36cba
-
SHA1
09f82b963129bbcc6d784308f0d39d8c6b09b293
-
SHA256
f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9
-
SHA512
9c76aaf04b237f3280a7cbdb169aff67bd1ffef0e7ab99dee8c3cede1e4f20f9186f79f2f6686033e0dbe746df223965978716d7634dcda7b680308aa57e6f9b
-
SSDEEP
3072:2RH+JrVpDLnwMFidhvyXsrzTtzh8nriUoCh73v875mDySxTVCaLGUD8cOe0xZJ:2R8r3DsdhvMszT9OQ+ZaI8jes
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1156 4344 WerFault.exe f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exepid process 4344 f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exedescription pid process Token: SeDebugPrivilege 4344 f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe"C:\Users\Admin\AppData\Local\Temp\f9fe8eea441fce4bbb9d81034cfeb617449a5816d104456ce5d45082fcb212f9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4344 -s 16522⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 4344 -ip 43441⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\SyncApprove.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4344-0-0x0000000000210000-0x000000000023E000-memory.dmpFilesize
184KB
-
memory/4344-1-0x00007FF84FD00000-0x00007FF8507C1000-memory.dmpFilesize
10.8MB
-
memory/4344-2-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/4344-3-0x000000001BEE0000-0x000000001BEF0000-memory.dmpFilesize
64KB
-
memory/4344-4-0x00007FF84FD00000-0x00007FF8507C1000-memory.dmpFilesize
10.8MB