Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 12:52

General

  • Target

    bc4b93322a6c0d44fffe579bddff0e4ef8b49283f102a0905f6473955c8502c3.exe

  • Size

    1.4MB

  • MD5

    4f92997d6990055beb2154cd9f4eabff

  • SHA1

    efb37d7a06131b87f2258b7837d6b14033fed43c

  • SHA256

    bc4b93322a6c0d44fffe579bddff0e4ef8b49283f102a0905f6473955c8502c3

  • SHA512

    0f5a0a98376fca16c93bac998557d5c4c2815fef619725c3a09178f68517cefd04dcd3d6242ad3cacbfce3ec1c3d6d0e314cd5f12f94db37c27d5ce6b2c763a5

  • SSDEEP

    24576:F8CF7ldz0a+6boVjTUIBSnUThwMK/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:Xm6EFTUySUTsLNiXicJFFRGNzj3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc4b93322a6c0d44fffe579bddff0e4ef8b49283f102a0905f6473955c8502c3.exe
    "C:\Users\Admin\AppData\Local\Temp\bc4b93322a6c0d44fffe579bddff0e4ef8b49283f102a0905f6473955c8502c3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1480
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    4ad8cf23727e5fbb2737eba49728f22e

    SHA1

    bdb49d65673ea13ad84ec79e2411d163ae48df3d

    SHA256

    de5c662d10a86ae1ecbba48ebe64acaa61eb445aa93d65a34c6eb9b3f85e8d59

    SHA512

    f669ccb199bd28c08538d312cf487cc2706485264683bf15a10820c0a5c477492fe022cb7c77a693da73b5bf1c7f8eac6966579b1682daa4fa50d3e67dfe7979

  • memory/1480-0-0x0000000140000000-0x00000001402EF000-memory.dmp

    Filesize

    2.9MB

  • memory/1480-1-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/1480-8-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/1480-12-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/1480-16-0x0000000140000000-0x00000001402EF000-memory.dmp

    Filesize

    2.9MB

  • memory/4612-15-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB

  • memory/4612-17-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB