Analysis

  • max time kernel
    153s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 06:20

General

  • Target

    ff4c0ba836518e65e3d334a09a6a54a9e3acc2be81a58ca1ad6111a10d582ac0.exe

  • Size

    1.3MB

  • MD5

    d676137bb67c8cbad8caa9c9593680b5

  • SHA1

    b2b3b81e9b8b5a092713214e52028b0d9651387a

  • SHA256

    ff4c0ba836518e65e3d334a09a6a54a9e3acc2be81a58ca1ad6111a10d582ac0

  • SHA512

    3897b11c0d3990304867e2fad1a9fd83d27fb2bb4c4e9f82f752520b961af00104b0b96ef8ebff761ce638ee64eb358bbde7c30a717c50b6dbb36ed70a58498a

  • SSDEEP

    12288:53P/aK2vB+8UMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik87:5/CKABFatr0zAiX90z/F0jsFB3SQkQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff4c0ba836518e65e3d334a09a6a54a9e3acc2be81a58ca1ad6111a10d582ac0.exe
    "C:\Users\Admin\AppData\Local\Temp\ff4c0ba836518e65e3d334a09a6a54a9e3acc2be81a58ca1ad6111a10d582ac0.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4744
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    c468dc9c403a55635986bb4524ae97c0

    SHA1

    1a3201bc0aee940d3f61009b803ce339c78fe35b

    SHA256

    7e65ffc49f74be475547401be1041e47bd4d1a8b16a92eca0708bb5ee3be5796

    SHA512

    ef45a32d1df0a777ebb15935bb1bfcef508068db915f4baf3ff7fbfd69e4578eb9986e5aa2e5960a09ceb39e3226a16b1123d5f6a07851c5f93b03cfcbb45c57

  • memory/2032-12-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB

  • memory/2032-16-0x0000000140000000-0x00000001401E9000-memory.dmp

    Filesize

    1.9MB

  • memory/4744-0-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB

  • memory/4744-1-0x00000000024E0000-0x0000000002547000-memory.dmp

    Filesize

    412KB

  • memory/4744-6-0x00000000024E0000-0x0000000002547000-memory.dmp

    Filesize

    412KB

  • memory/4744-7-0x00000000024E0000-0x0000000002547000-memory.dmp

    Filesize

    412KB

  • memory/4744-15-0x0000000000400000-0x00000000005F7000-memory.dmp

    Filesize

    2.0MB