Analysis

  • max time kernel
    168s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 15:02

General

  • Target

    a2b1ca6b07b686265e9fab1d9e8df0b71da88baf97b17febd443f5a2a5e80f86.exe

  • Size

    3.0MB

  • MD5

    7cf245c19260304a201976673c6b2cfc

  • SHA1

    b96729f753e2e2d6f5755a54f44c84fa3c8a2532

  • SHA256

    a2b1ca6b07b686265e9fab1d9e8df0b71da88baf97b17febd443f5a2a5e80f86

  • SHA512

    f40f08548366cd9a89626d7caaf5d62743f7d4b3d2374af01a2610668a076633402ae77b52cd8b15ae3b64e609deb2f6810b8ef7cd76cd6d3c738be8121dbac3

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlWkUSwIaBkgEQDrX:c+8X9G3vP3AMQJSwIa6gtX

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b1ca6b07b686265e9fab1d9e8df0b71da88baf97b17febd443f5a2a5e80f86.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b1ca6b07b686265e9fab1d9e8df0b71da88baf97b17febd443f5a2a5e80f86.exe"
    1⤵
      PID:2256
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2820-0-0x0000000004070000-0x0000000004071000-memory.dmp

      Filesize

      4KB

    • memory/2820-1-0x0000000004070000-0x0000000004071000-memory.dmp

      Filesize

      4KB

    • memory/2820-5-0x0000000002670000-0x0000000002680000-memory.dmp

      Filesize

      64KB