Analysis

  • max time kernel
    21s
  • max time network
    62s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 06:29

General

  • Target

    3b9e8791ab280db2e3f1719ddec624aa279e3ccfda5565d17bf6817d8e204fe2.exe

  • Size

    1.8MB

  • MD5

    616ef43425a98c0fd1288f4105ad8c76

  • SHA1

    2f25f7d488563806a7a82eede016f16d5e20e92b

  • SHA256

    3b9e8791ab280db2e3f1719ddec624aa279e3ccfda5565d17bf6817d8e204fe2

  • SHA512

    af117c1f92f860d2febacbad2ab7e6aa311ff4c33ae67fa50b469bb46b4fdd1f87f33a8ce42fef0818ac2d5f1017b137ae4ca35e2507c72e6aa7342e8b7a09a8

  • SSDEEP

    49152:nK9QYfDPJZr9ra11M+jtIbCRLlv7p0tOttMVFuIWq9LRbCbCCP:nK9Q0DPpIxkCvV0tzVaP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b9e8791ab280db2e3f1719ddec624aa279e3ccfda5565d17bf6817d8e204fe2.exe
    "C:\Users\Admin\AppData\Local\Temp\3b9e8791ab280db2e3f1719ddec624aa279e3ccfda5565d17bf6817d8e204fe2.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3296
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1544
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:3284
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:3304
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2444
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
        PID:3352
      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
        1⤵
          PID:5064
        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
          "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
          1⤵
            PID:3896

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

            Filesize

            2.1MB

            MD5

            b71deff6d1c9c3ed3ed64e567b3e0839

            SHA1

            6a1de018336cca265b17b768868ab641253cd773

            SHA256

            f82b71682e55e6ddb13896e3724d1c855fea1648e4fe482ca87e26ab41eb7cde

            SHA512

            355c5268136075ae2d937ba1bf3a34f258c341b52d3e4c85d52660f4a0bfbb6a169db3b7698075931609b7f44b54ac4bf8af6caa29923e3acc8f3b3aab8df792

          • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

            Filesize

            1.4MB

            MD5

            851db731f79183affd4dd4d29361ab34

            SHA1

            770d3767e01abe7551274da568eade7ce623397d

            SHA256

            ff89be0d3f2e8acfa1bfd2c6d15301510b38a41bc51dfbc4bf666a85b4f0f643

            SHA512

            9ba16607c1d2b5582e2823a12f6435182eca61745aa670536ad1513c18de99e6cc5a03cca5eb8f757984f4fc5744a8d40d5ec23b8eac36dc9e471d08397eda40

          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

            Filesize

            2.1MB

            MD5

            83952fa30e75a33cfd44038e15b991f2

            SHA1

            1360db5cc654b6502c5d5f174ae8f4b86439fff6

            SHA256

            6bc14d50333edf18c9b69c09379fb3660a208030ddb7c0cc781ae59a1869886f

            SHA512

            dccb53387624d71fea9e51247c349be6754a5483e05ee9f91e7cef5b6b80a0cb0cd1815dae844f029bca2f21dbf766a569015198a4acde085037e0aea273864c

          • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

            Filesize

            1.3MB

            MD5

            83d52dc380eae4633793f95f54b2d1c3

            SHA1

            4aac622eb90fbb3538b2a92933fcbc4aaaaa992f

            SHA256

            9aba92671a15af317777828e35eb47b1074bb4d8e2873289fddc82da9b7cbea0

            SHA512

            67abb1b8380c0bab272a2a87754c6b6170cfbbcf8efa6f1cbeb7aaba952354c0d9d144692fee9ae54c40ea12a1f73e8134b7d04a43735b62ae8bad6e3f4fc627

          • C:\Windows\System32\FXSSVC.exe

            Filesize

            1.2MB

            MD5

            f54acc74f928ab2ab7997271272d74a4

            SHA1

            8acf9d1ce9d59034163e7ce01eb8b7dbd6273ac1

            SHA256

            d999e5146321857fabe48573705bb7d9ddbb70309e0ae2f3a9cda0995a92a650

            SHA512

            1ac4490e22a23e968b66a0b6af21c04c80febec56dbdbfa44e77a430584f83376b8b76e9c3bc6706239e581675619581ceaf20dab94a83731175e5bffad05669

          • C:\Windows\System32\alg.exe

            Filesize

            1.3MB

            MD5

            bc212ba2fabd4e7bf7960b9fb26f5f0b

            SHA1

            c900b6219ae38b00548463b4500d8298a294cb66

            SHA256

            91a0ebb3e13fe9adcb83eb2021b2541c94b569189a655d2f9001075c4fed02c4

            SHA512

            85bcf0523980cf7800e56a40341cbaab62750f96d037e25921484b1cfbaec8db5b713e23675d4c87db4202fe2a7ac3ccdf574e44548eee4450e6d57b6f6b55d1

          • memory/1544-145-0x0000000140000000-0x00000001401E9000-memory.dmp

            Filesize

            1.9MB

          • memory/1544-13-0x00000000004C0000-0x0000000000520000-memory.dmp

            Filesize

            384KB

          • memory/1544-12-0x0000000140000000-0x00000001401E9000-memory.dmp

            Filesize

            1.9MB

          • memory/1544-20-0x00000000004C0000-0x0000000000520000-memory.dmp

            Filesize

            384KB

          • memory/2444-113-0x0000000000930000-0x0000000000990000-memory.dmp

            Filesize

            384KB

          • memory/2444-105-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB

          • memory/2444-106-0x0000000000930000-0x0000000000990000-memory.dmp

            Filesize

            384KB

          • memory/2444-112-0x0000000000930000-0x0000000000990000-memory.dmp

            Filesize

            384KB

          • memory/2444-117-0x0000000000930000-0x0000000000990000-memory.dmp

            Filesize

            384KB

          • memory/2444-119-0x0000000140000000-0x0000000140135000-memory.dmp

            Filesize

            1.2MB

          • memory/3284-95-0x0000000140000000-0x00000001401E8000-memory.dmp

            Filesize

            1.9MB

          • memory/3284-101-0x00000000004C0000-0x0000000000520000-memory.dmp

            Filesize

            384KB

          • memory/3296-132-0x0000000000400000-0x00000000005DC000-memory.dmp

            Filesize

            1.9MB

          • memory/3296-0-0x0000000000400000-0x00000000005DC000-memory.dmp

            Filesize

            1.9MB

          • memory/3296-1-0x0000000000680000-0x00000000006E7000-memory.dmp

            Filesize

            412KB

          • memory/3296-6-0x0000000000680000-0x00000000006E7000-memory.dmp

            Filesize

            412KB

          • memory/3296-7-0x0000000000680000-0x00000000006E7000-memory.dmp

            Filesize

            412KB

          • memory/3352-128-0x0000000000CC0000-0x0000000000D20000-memory.dmp

            Filesize

            384KB

          • memory/3352-120-0x0000000000CC0000-0x0000000000D20000-memory.dmp

            Filesize

            384KB

          • memory/3352-121-0x0000000140000000-0x0000000140237000-memory.dmp

            Filesize

            2.2MB

          • memory/3896-146-0x0000000002250000-0x00000000022B0000-memory.dmp

            Filesize

            384KB

          • memory/3896-148-0x0000000140000000-0x0000000140209000-memory.dmp

            Filesize

            2.0MB

          • memory/5064-133-0x00000000001A0000-0x0000000000200000-memory.dmp

            Filesize

            384KB

          • memory/5064-135-0x0000000140000000-0x000000014022B000-memory.dmp

            Filesize

            2.2MB

          • memory/5064-141-0x00000000001A0000-0x0000000000200000-memory.dmp

            Filesize

            384KB