Analysis

  • max time kernel
    182s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 23:24

General

  • Target

    5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe

  • Size

    1.4MB

  • MD5

    4e0c72fa895fd1821158a31e9ec111e2

  • SHA1

    b02394c67284e1e411ec89485883198d4464ac33

  • SHA256

    5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36

  • SHA512

    16ab20839a88b52e209d2c9a18e42a73490bae93200402c02f09e444cf7fee4016a117c4fefbe5a0db98b688349a558ce242763aac82c3e035f1a8708298dfc8

  • SSDEEP

    12288:P0P/aK2vB+zY1qaJr+OO3EiehckGFPIYBrH+6fVQ2kLpvtLkKHwonql:PkCKABMaBVmle+vPRjBVSLpvWzo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe
    "C:\Users\Admin\AppData\Local\Temp\5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1640
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    a382292aeda35d242c25d0a006671307

    SHA1

    e44155ba4589f7c1c3d410d25f68b41669d063d5

    SHA256

    4e06bc40c6eaf7adab17ac0537826f9a1f10813af9c1e613053b2f10e5507cb4

    SHA512

    3102fd5ddee01a6a3d03f2a8a4e6f06bcecc08aeceb7a72a10dcc06fcdcc5225fee96e4084fb55ac329624eaa9229c655d85ed9bc6053899fc7c1dc48f9b162f

  • memory/1640-0-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1640-1-0x0000000000CB0000-0x0000000000D16000-memory.dmp

    Filesize

    408KB

  • memory/1640-6-0x0000000000CB0000-0x0000000000D16000-memory.dmp

    Filesize

    408KB

  • memory/1640-7-0x0000000000CB0000-0x0000000000D16000-memory.dmp

    Filesize

    408KB

  • memory/1640-16-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4968-11-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB

  • memory/4968-17-0x0000000140000000-0x0000000140201000-memory.dmp

    Filesize

    2.0MB