Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2023, 11:32

General

  • Target

    tmp.exe

  • Size

    428KB

  • MD5

    483d71b482d37c5b805f98b11d8fc20f

  • SHA1

    201639df817aa041f40bcc6411c6faaf00c1a7c4

  • SHA256

    8fc6d1d2d1d833f83a1bfc9656e1c1b5cfb01df873fb583dd046c3de9703427f

  • SHA512

    5ee17eff9c72d5636dde03acabea1df57e6e8609a9240d916e65edc5b95b89095118892d3135454da76bff390933dbebc591734d3971501674db4c08e2ffc7c8

  • SSDEEP

    12288:T1EeXNhsrBTcyvImbSmSg6bVChl86M74gvktLLmF:T5yvImW0gvktLLm

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c wmic csproduct get UUID > C:\uid.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic csproduct get UUID
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\uid.txt
      2⤵
        PID:2512
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic cpu get processorid > C:\cpuid.txt
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic cpu get processorid
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2432
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\cpuid.txt
        2⤵
          PID:3016

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\cpuid.txt

        Filesize

        82B

        MD5

        68c7390ea731dd5f829e2adfbdf23295

        SHA1

        c82bd440ad3250310f203f12033ce12649f4da87

        SHA256

        7737b74a99e724453ae3f690ebaebe9fde866d44dd25b3560f00f50e7445c080

        SHA512

        ff8386d8aa50ad3d90c8eea824e4ca407d1bac7df5fba44a0886f4d75375b7361ca53da369b9781256fd33b032b32547d8234bab67b9cfae56cf4fbbddc8d1d4

      • C:\uid.txt

        Filesize

        162B

        MD5

        9d9362fca70310015cd0561d9a9deafc

        SHA1

        31d83515b7d090a6602e541976086938e5769cc6

        SHA256

        f78de8ee7109fd3970aa6c014eb01717c55a78c57c7bf1f7a5b898afb13bb13b

        SHA512

        161790306e40b5b7e957b764b679869ab2d8e104cf8c38321fe4eed98f201a5ca7c168ab59beeddd167257e99958a27011ab6b04cba3f67276544186b3103355