Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2023 12:16

General

  • Target

    c921686af22ab6697f09e1dfd2903d0b6b7b79f93093499e86fd144bd9b312d0.exe

  • Size

    1.4MB

  • MD5

    125c0623b6fdf12dfac2190af81d20c4

  • SHA1

    ea7353eeac74ddac96b53cc42e24b5c816f82c08

  • SHA256

    c921686af22ab6697f09e1dfd2903d0b6b7b79f93093499e86fd144bd9b312d0

  • SHA512

    b12c5b8ae71830fa5b1e4cb2ef9928b48f228ba4877fed45949ac5c3535570d54f2383afec1e96353e636106d1c9c8c407ff5e7d166ae9a5d76ad2d7ee15959a

  • SSDEEP

    12288:27gKNkhm/JuyXnPB+h8WHuXI7vgbrWVQhTCYHvRktx/aICF9flefuKaO0VQ/:27zNkhm5PBX2743TvRk6NwG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c921686af22ab6697f09e1dfd2903d0b6b7b79f93093499e86fd144bd9b312d0.exe
    "C:\Users\Admin\AppData\Local\Temp\c921686af22ab6697f09e1dfd2903d0b6b7b79f93093499e86fd144bd9b312d0.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2992
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    957561a015d8a3729a813f5a163b396e

    SHA1

    c6e070d58f47ee0651ac42372194e4fa310ab387

    SHA256

    07aedcde0618f783d7ac8f766c2668977824c08a98f13daf96dc5ce25066dcdb

    SHA512

    0d025e0d3f394c86df662a3f599962f6976c1e1887ef90177ff4710f9d538a9f413473f6e586b264cb81dcc8bdcd9a3a6ed7969887cbc7616591a1320f9c1c0e

  • memory/2016-13-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB

  • memory/2016-16-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB

  • memory/2992-0-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/2992-1-0x00000000008C0000-0x0000000000927000-memory.dmp

    Filesize

    412KB

  • memory/2992-6-0x00000000008C0000-0x0000000000927000-memory.dmp

    Filesize

    412KB

  • memory/2992-7-0x00000000008C0000-0x0000000000927000-memory.dmp

    Filesize

    412KB

  • memory/2992-15-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB