Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 02:46

General

  • Target

    App/DirectoryMonitor/DirectoryMonitorConsole.exe

  • Size

    499KB

  • MD5

    e0b22ec0a5f213ba536f563af8d63692

  • SHA1

    7d0c5830628083e4567a2b5128f427fa6d52ef98

  • SHA256

    5850c43861aea1c3bcb64c94fb26c3aa9c4b6e5f433ee14a1f1c028c9cef3bf4

  • SHA512

    dcc764444d50b41e6c5ef7f5afacbdb0ca3f48b6f52dadb8ed0ca147adcf13740915e2dea4d37cc817b34ea7d978d699945418eb96fbb5ee9e3af63e5de67eb9

  • SSDEEP

    3072:RIcM6fCj0fCh2tn4kMgKtJoua3MHTwMJJGP8o/DC:RID3A4dgKb5JTwMaHC

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConsole.exe
    "C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConsole.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\system32\auditpol.exe
      "auditpol.exe" /get /subcategory:"{0CCE921D-69AE-11D9-BED3-505054503030}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Windows\system32\auditpol.exe
      "auditpol.exe" /set /subcategory:"{0CCE921D-69AE-11D9-BED3-505054503030}" /success:disable
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2512
    • C:\Windows\system32\auditpol.exe
      "auditpol.exe" /get /subcategory:"{0CCE9223-69AE-11D9-BED3-505054503030}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:372
    • C:\Windows\system32\auditpol.exe
      "auditpol.exe" /set /subcategory:"{0CCE9223-69AE-11D9-BED3-505054503030}" /success:disable
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-0-0x00000000008E0000-0x000000000095E000-memory.dmp

    Filesize

    504KB

  • memory/1964-1-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-2-0x0000000000890000-0x00000000008B4000-memory.dmp

    Filesize

    144KB

  • memory/1964-3-0x0000000002150000-0x00000000021BC000-memory.dmp

    Filesize

    432KB

  • memory/1964-4-0x000000001AC60000-0x000000001ACE0000-memory.dmp

    Filesize

    512KB

  • memory/1964-5-0x000000001A2F0000-0x000000001A35E000-memory.dmp

    Filesize

    440KB

  • memory/1964-6-0x0000000000880000-0x000000000088A000-memory.dmp

    Filesize

    40KB

  • memory/1964-7-0x00000000008C0000-0x00000000008D0000-memory.dmp

    Filesize

    64KB

  • memory/1964-8-0x0000000002090000-0x00000000020A0000-memory.dmp

    Filesize

    64KB

  • memory/1964-9-0x000000001A610000-0x000000001A670000-memory.dmp

    Filesize

    384KB

  • memory/1964-10-0x00000000021C0000-0x00000000021E5000-memory.dmp

    Filesize

    148KB

  • memory/1964-15-0x000000001AA80000-0x000000001AB5A000-memory.dmp

    Filesize

    872KB

  • memory/1964-16-0x000007FEF5160000-0x000007FEF5B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1964-17-0x000000001AC60000-0x000000001ACE0000-memory.dmp

    Filesize

    512KB

  • memory/1964-18-0x000000001AC60000-0x000000001ACE0000-memory.dmp

    Filesize

    512KB

  • memory/1964-21-0x000000001A670000-0x000000001A684000-memory.dmp

    Filesize

    80KB

  • memory/1964-23-0x000000001B1C0000-0x000000001B220000-memory.dmp

    Filesize

    384KB

  • memory/1964-24-0x000000001A500000-0x000000001A50A000-memory.dmp

    Filesize

    40KB

  • memory/1964-25-0x000000001A690000-0x000000001A6B0000-memory.dmp

    Filesize

    128KB

  • memory/1964-27-0x000000001B350000-0x000000001B388000-memory.dmp

    Filesize

    224KB

  • memory/1964-26-0x000000001A690000-0x000000001A6B0000-memory.dmp

    Filesize

    128KB

  • memory/1964-28-0x000000001B350000-0x000000001B388000-memory.dmp

    Filesize

    224KB

  • memory/1964-29-0x000000001AB60000-0x000000001AB78000-memory.dmp

    Filesize

    96KB

  • memory/1964-30-0x000000001AB60000-0x000000001AB78000-memory.dmp

    Filesize

    96KB

  • memory/1964-33-0x000000001B390000-0x000000001B3AC000-memory.dmp

    Filesize

    112KB

  • memory/1964-32-0x000000001B220000-0x000000001B23E000-memory.dmp

    Filesize

    120KB

  • memory/1964-34-0x000000001B390000-0x000000001B3AC000-memory.dmp

    Filesize

    112KB

  • memory/1964-36-0x000000001B3B0000-0x000000001B3C8000-memory.dmp

    Filesize

    96KB

  • memory/1964-35-0x000000001B3B0000-0x000000001B3C8000-memory.dmp

    Filesize

    96KB

  • memory/1964-37-0x000000001B3D0000-0x000000001B3E6000-memory.dmp

    Filesize

    88KB

  • memory/1964-31-0x000000001B220000-0x000000001B23E000-memory.dmp

    Filesize

    120KB

  • memory/1964-40-0x000000001B600000-0x000000001B614000-memory.dmp

    Filesize

    80KB

  • memory/1964-39-0x000000001B600000-0x000000001B614000-memory.dmp

    Filesize

    80KB

  • memory/1964-38-0x000000001B3D0000-0x000000001B3E6000-memory.dmp

    Filesize

    88KB

  • memory/1964-44-0x000000001B670000-0x000000001B692000-memory.dmp

    Filesize

    136KB

  • memory/1964-43-0x000000001B670000-0x000000001B692000-memory.dmp

    Filesize

    136KB

  • memory/1964-42-0x000000001B620000-0x000000001B63A000-memory.dmp

    Filesize

    104KB

  • memory/1964-41-0x000000001B620000-0x000000001B63A000-memory.dmp

    Filesize

    104KB

  • memory/1964-45-0x000000001AC60000-0x000000001ACE0000-memory.dmp

    Filesize

    512KB

  • memory/1964-47-0x000000001C720000-0x000000001C780000-memory.dmp

    Filesize

    384KB