Analysis

  • max time kernel
    122s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:49

General

  • Target

    ASM-Guard/ASM.Guard.2.9.1.exe

  • Size

    4.1MB

  • MD5

    37616347c10d6f6623076e662b49f440

  • SHA1

    b924cab04accb65219083b2d06a52bbb5db9c5fd

  • SHA256

    4f792d5e32547cdbd6724cdf5fb4c6e4956c8f28fdc8be4a56f47b0964d393b1

  • SHA512

    917f09979eda45b182a642d9422f4c02c1c41d9d887f8c45b3eeed53e3f97e450306455a4372d16fa537421f56f9f5c6435ad8830b84c3aa1fec2fce580f4256

  • SSDEEP

    98304:1DMdmIG8JOPLIjwpbW+xPsFlguFWe5+Vvdo/Wj13Zu:1QFG8JoLIjArMs+Ot

Score
7/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 26 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ASM-Guard\ASM.Guard.2.9.1.exe
    "C:\Users\Admin\AppData\Local\Temp\ASM-Guard\ASM.Guard.2.9.1.exe"
    1⤵
    • Modifies system executable filetype association
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1712-1-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

    Filesize

    9.9MB

  • memory/1712-0-0x0000000000B80000-0x00000000011D2000-memory.dmp

    Filesize

    6.3MB

  • memory/1712-2-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1712-3-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-4-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-5-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-6-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

    Filesize

    9.9MB

  • memory/1712-7-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-8-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-9-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-10-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-11-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB

  • memory/1712-12-0x000000001BBC0000-0x000000001BC40000-memory.dmp

    Filesize

    512KB