Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 14:11

General

  • Target

    37616347c10d6f6623076e662b49f440.exe

  • Size

    4.1MB

  • MD5

    37616347c10d6f6623076e662b49f440

  • SHA1

    b924cab04accb65219083b2d06a52bbb5db9c5fd

  • SHA256

    4f792d5e32547cdbd6724cdf5fb4c6e4956c8f28fdc8be4a56f47b0964d393b1

  • SHA512

    917f09979eda45b182a642d9422f4c02c1c41d9d887f8c45b3eeed53e3f97e450306455a4372d16fa537421f56f9f5c6435ad8830b84c3aa1fec2fce580f4256

  • SSDEEP

    98304:1DMdmIG8JOPLIjwpbW+xPsFlguFWe5+Vvdo/Wj13Zu:1QFG8JoLIjArMs+Ot

Score
7/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37616347c10d6f6623076e662b49f440.exe
    "C:\Users\Admin\AppData\Local\Temp\37616347c10d6f6623076e662b49f440.exe"
    1⤵
    • Modifies system executable filetype association
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3436-0-0x00000217F2680000-0x00000217F2CD2000-memory.dmp

    Filesize

    6.3MB

  • memory/3436-1-0x00007FFDCB3C0000-0x00007FFDCBE81000-memory.dmp

    Filesize

    10.8MB

  • memory/3436-2-0x00000217F4830000-0x00000217F4831000-memory.dmp

    Filesize

    4KB

  • memory/3436-3-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-4-0x00000217F4980000-0x00000217F498A000-memory.dmp

    Filesize

    40KB

  • memory/3436-5-0x00000217F50E0000-0x00000217F50F2000-memory.dmp

    Filesize

    72KB

  • memory/3436-6-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-7-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-8-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-9-0x00007FFDCB3C0000-0x00007FFDCBE81000-memory.dmp

    Filesize

    10.8MB

  • memory/3436-10-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-11-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-12-0x00000217F87A0000-0x00000217F88A2000-memory.dmp

    Filesize

    1.0MB

  • memory/3436-13-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB

  • memory/3436-14-0x00000217F5120000-0x00000217F5130000-memory.dmp

    Filesize

    64KB