Analysis

  • max time kernel
    15s
  • max time network
    23s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-it
  • resource tags

    arch:x64arch:x86image:win10-20230915-itlocale:it-itos:windows10-1703-x64systemwindows
  • submitted
    19-10-2023 14:46

General

  • Target

    LECmd.exe

  • Size

    4.7MB

  • MD5

    10e26753f3e1b6d9bc43d48776da1672

  • SHA1

    fee7dbfcd10f3a78e4a6322a3c8a4cec2a2cfc7c

  • SHA256

    94bc3f3cfb747e74147209d9e63c4b50cdbb141b4901fa95fcd30cac3764c91e

  • SHA512

    523510dc92ffa11885874a4234bf245ef6d5d5f6596a7bac4eb6b1c3ab74e2de63cdf7719cdda2f84faa90c4d6fcda11b47478f7e503c8226f65949334c3b350

  • SSDEEP

    98304:jRSUy5jW/cV5vv6MRnqCMDF9fbiSg+Nt2G2dy1E26+GeZl:VSUy5jWEvv6EoHmSb6ynX

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LECmd.exe
    "C:\Users\Admin\AppData\Local\Temp\LECmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4696-0-0x000002A4D7BE0000-0x000002A4D808E000-memory.dmp

    Filesize

    4.7MB

  • memory/4696-1-0x00007FFB91D90000-0x00007FFB9277C000-memory.dmp

    Filesize

    9.9MB

  • memory/4696-3-0x000002A4D9C40000-0x000002A4D9C50000-memory.dmp

    Filesize

    64KB

  • memory/4696-2-0x000002A4D9BD0000-0x000002A4D9BF8000-memory.dmp

    Filesize

    160KB

  • memory/4696-4-0x000002A4F2630000-0x000002A4F2730000-memory.dmp

    Filesize

    1024KB

  • memory/4696-6-0x000002A4D9C80000-0x000002A4D9C9A000-memory.dmp

    Filesize

    104KB

  • memory/4696-5-0x000002A4D9C00000-0x000002A4D9C3C000-memory.dmp

    Filesize

    240KB

  • memory/4696-7-0x000002A4F2730000-0x000002A4F2792000-memory.dmp

    Filesize

    392KB

  • memory/4696-8-0x000002A4D9C60000-0x000002A4D9C70000-memory.dmp

    Filesize

    64KB

  • memory/4696-24-0x000002A4F2900000-0x000002A4F2908000-memory.dmp

    Filesize

    32KB

  • memory/4696-25-0x000002A4F2910000-0x000002A4F2936000-memory.dmp

    Filesize

    152KB

  • memory/4696-26-0x000002A4F2980000-0x000002A4F2988000-memory.dmp

    Filesize

    32KB

  • memory/4696-27-0x000002A4F2CC0000-0x000002A4F2DC0000-memory.dmp

    Filesize

    1024KB

  • memory/4696-29-0x000002A4F2940000-0x000002A4F295E000-memory.dmp

    Filesize

    120KB

  • memory/4696-30-0x000002A4F2990000-0x000002A4F29C6000-memory.dmp

    Filesize

    216KB

  • memory/4696-31-0x000002A4F2960000-0x000002A4F2970000-memory.dmp

    Filesize

    64KB

  • memory/4696-32-0x000002A4F29C0000-0x000002A4F2A6A000-memory.dmp

    Filesize

    680KB

  • memory/4696-33-0x000002A4F28F0000-0x000002A4F28F8000-memory.dmp

    Filesize

    32KB

  • memory/4696-35-0x00007FFB91D90000-0x00007FFB9277C000-memory.dmp

    Filesize

    9.9MB