Analysis

  • max time kernel
    95s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 13:14

General

  • Target

    44be284bca3f7c2d92d2f9021a56071e8b0316643b7d06da0ef000b97f09503e.exe

  • Size

    3.9MB

  • MD5

    e21d65388faadf61f360d18e37389d6f

  • SHA1

    ff911e9776cc87715cf0481188a055f484724b0d

  • SHA256

    44be284bca3f7c2d92d2f9021a56071e8b0316643b7d06da0ef000b97f09503e

  • SHA512

    85e28e12a96a7032a70a61b55d24dd77cb62507f901b6908cd43d3b5b6feb30bed831cf5de9e8bf1f3f6e1301899ea5661efb577fcaefd05004519b606b360f6

  • SSDEEP

    49152:2YDtEXcAew/0iIOUZw33dRwZqiRiKVcdIA8tkEBQWluAQHK:3WrPiHu8JzluAQH

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44be284bca3f7c2d92d2f9021a56071e8b0316643b7d06da0ef000b97f09503e.exe
    "C:\Users\Admin\AppData\Local\Temp\44be284bca3f7c2d92d2f9021a56071e8b0316643b7d06da0ef000b97f09503e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -ExecutionPolicy Bypass -File wei-close.ps1 qbittorrent
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\wei\status.dat
    Filesize

    12B

    MD5

    ac963522636ece1161192ea4985e9ef6

    SHA1

    9a4309a5e05e38038ff659fc46917d497327291f

    SHA256

    5fabc2d9e049aaf03fb8eb337fe37ddbbca16a754d8534ea4697b6ede858a311

    SHA512

    a6698dc7d7c35fb64007d107654e411c225a7f24bc2e3ba60be9521ff92506199ce0fdfb698922e304c12d56ca18197d609fbc021313883c6d8f7a2a936d62e4

  • memory/3036-15-0x000000001B260000-0x000000001B542000-memory.dmp
    Filesize

    2.9MB

  • memory/3036-16-0x000007FEF5EE0000-0x000007FEF687D000-memory.dmp
    Filesize

    9.6MB

  • memory/3036-17-0x000007FEF5EE0000-0x000007FEF687D000-memory.dmp
    Filesize

    9.6MB

  • memory/3036-18-0x0000000002660000-0x00000000026E0000-memory.dmp
    Filesize

    512KB

  • memory/3036-19-0x0000000002660000-0x00000000026E0000-memory.dmp
    Filesize

    512KB

  • memory/3036-20-0x0000000002660000-0x00000000026E0000-memory.dmp
    Filesize

    512KB

  • memory/3036-21-0x0000000001FC0000-0x0000000001FC8000-memory.dmp
    Filesize

    32KB

  • memory/3036-22-0x000007FEF5EE0000-0x000007FEF687D000-memory.dmp
    Filesize

    9.6MB