Analysis

  • max time kernel
    23s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 19:40

General

  • Target

    R3nzSkin_Injector.exe

  • Size

    268KB

  • MD5

    af45520e94bbffb12e88247712bf07e3

  • SHA1

    05d180b9ef4f95d80b0c6a4ec71a2164ddf84eeb

  • SHA256

    3d7217cead588bb786f4101f2f612377f8fb480e2f4f65765f8004f9f46ee550

  • SHA512

    42b9fd02a042ece73174b7c46d82b1b51e076eaf6ce9fb96baae233c75ea3257ceafa2ced69e35610ad56db17dcd99ee04894a5c2d7ab3b7a9d7b52f6bd1d620

  • SSDEEP

    6144:FU64RzDQlu/oCes/N+mscsVTcA/Yxo7fGQZy9gAsm3oAEdsG/2x6kzsGY/A4Sr+F:GBQBmrsVTcA/YxofGQZy9gAsm3oAEdsa

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\R3nzSkin_Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\R3nzSkin_Injector.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-0-0x000000013F2A0000-0x000000013F2EA000-memory.dmp

    Filesize

    296KB

  • memory/2692-1-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2692-2-0x000000001AF40000-0x000000001AFC0000-memory.dmp

    Filesize

    512KB

  • memory/2692-3-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2692-4-0x000000001AF40000-0x000000001AFC0000-memory.dmp

    Filesize

    512KB

  • memory/2692-5-0x000007FEF5140000-0x000007FEF5B2C000-memory.dmp

    Filesize

    9.9MB