Analysis

  • max time kernel
    21s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 03:18

General

  • Target

    6481bf436a3b0ed65d95f6787eb528ccbd13e4449270220651637b5f53ce4051.exe

  • Size

    14.1MB

  • MD5

    566286fb16ebc5d4de39a8fc3620674c

  • SHA1

    41d9d0f562f6e09533cc2c1e4985d0070858b2c5

  • SHA256

    6481bf436a3b0ed65d95f6787eb528ccbd13e4449270220651637b5f53ce4051

  • SHA512

    7da2a2d1dd403b5176c50b48b3675618e89a599751d50417478917420a1a5a3c102db91aec27eca2d502bf2829753c8f6029b6ddb1db637a3ec8461ae401f611

  • SSDEEP

    196608:6lisPV6f6QBYl6tf/1YgrfwcMf9mcrJcJsv6tWKFdu9CYQXFEfnpwM:6QqQ7YgrYXDaJsv6tWKFdu9CDeH

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6481bf436a3b0ed65d95f6787eb528ccbd13e4449270220651637b5f53ce4051.exe
    "C:\Users\Admin\AppData\Local\Temp\6481bf436a3b0ed65d95f6787eb528ccbd13e4449270220651637b5f53ce4051.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic computersystem get Manufacturer, model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3056
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic diskdrive list brief
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2180
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic process list brief
      2⤵
        PID:2732
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic computersystem get Model
        2⤵
          PID:1196
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic diskdrive list brief
          2⤵
            PID:2556
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic process list brief
            2⤵
              PID:2692

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads