Analysis

  • max time kernel
    92s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 02:46

General

  • Target

    App/DirectoryMonitor/DirectoryMonitorConfigAssistant.exe

  • Size

    815KB

  • MD5

    67d8ba0b40cdacf007ce110e2c09801a

  • SHA1

    fd7e5d59a250956481cf005c161d8eda19084ab3

  • SHA256

    211441c9d079b604286efdf8bc81e7029a955f6e0c4d2442a7c7d1147f69e06d

  • SHA512

    58038e9951e72735ea5df50764cd4d3b4756696119622efe8ae06eef4c7ead82566b5d6db8d8c645eeeb0afd5e37ef7bb462efb0d13e317674f4191bbf002edf

  • SSDEEP

    3072:S52mS4HTwMNl8xw0SR5KIC7pLwMasRSOYJGrFrIGDb:S7S8TwMNl82VqDVLwM8ODvb

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConfigAssistant.exe
    "C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConfigAssistant.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\System32\Wbem\winmgmt.exe
      "winmgmt" /verifyrepository
      2⤵
        PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/456-0-0x00007FFA756D0000-0x00007FFA76071000-memory.dmp

      Filesize

      9.6MB

    • memory/456-1-0x00007FFA756D0000-0x00007FFA76071000-memory.dmp

      Filesize

      9.6MB

    • memory/456-2-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB

    • memory/456-18-0x000000001CDA0000-0x000000001D26E000-memory.dmp

      Filesize

      4.8MB

    • memory/456-19-0x000000001D270000-0x000000001D30C000-memory.dmp

      Filesize

      624KB

    • memory/456-20-0x000000001C0C0000-0x000000001C0C8000-memory.dmp

      Filesize

      32KB

    • memory/456-21-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB

    • memory/456-22-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB

    • memory/456-23-0x000000001FB00000-0x000000001FB66000-memory.dmp

      Filesize

      408KB

    • memory/456-24-0x00007FFA756D0000-0x00007FFA76071000-memory.dmp

      Filesize

      9.6MB

    • memory/456-25-0x00007FFA756D0000-0x00007FFA76071000-memory.dmp

      Filesize

      9.6MB

    • memory/456-26-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB

    • memory/456-27-0x000000001FD50000-0x000000001FDB2000-memory.dmp

      Filesize

      392KB

    • memory/456-28-0x000000001FAE0000-0x000000001FB00000-memory.dmp

      Filesize

      128KB

    • memory/456-29-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB

    • memory/456-30-0x00000000016F0000-0x0000000001700000-memory.dmp

      Filesize

      64KB