Analysis

  • max time kernel
    164s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 21:30

General

  • Target

    e0902df0371a193a48585f552fd2c748f3d62b6d0d46de1ac6ca0cef7f3ecce0.exe

  • Size

    1.2MB

  • MD5

    2a69170d5a771a148db480e8ee742c28

  • SHA1

    7dbfc9d17f0dcade8bca0282b9066cdead29e688

  • SHA256

    e0902df0371a193a48585f552fd2c748f3d62b6d0d46de1ac6ca0cef7f3ecce0

  • SHA512

    6754f482248635e0ee51ab7673c9d2cab9cf98cde4602a92e2b7bc84ba870874fe7b9833555265028bb8ed22666f6ed7837dfc80b4c8348c573d86d20f0153cd

  • SSDEEP

    12288:HDP/aK2vB+36+lI8MTDFLnfP/8f/MUHOlrqBF53XF+reOc0F+nuFyY:HbCKAB6TlUZfI/QRqBb1wRS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0902df0371a193a48585f552fd2c748f3d62b6d0d46de1ac6ca0cef7f3ecce0.exe
    "C:\Users\Admin\AppData\Local\Temp\e0902df0371a193a48585f552fd2c748f3d62b6d0d46de1ac6ca0cef7f3ecce0.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4132
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:4020

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\alg.exe

          Filesize

          1.2MB

          MD5

          463078431ca062d45eec3ed1daefd663

          SHA1

          c193ba367de0d31188c99b888b53e9f6495dcf98

          SHA256

          bb0c3149a4fbb37ccb411d41011707cc4ca6a3f75e1743f5234e4bde3ea766a1

          SHA512

          9d1977757ae57d58aaf36d77503f092656ec8831e38429df86ba80f3f7490dee81503f7dc7ce79471e14268569a47bcd9f140a6bd15b7facfe0373c88048d1fb

        • memory/4020-13-0x0000000140000000-0x0000000140136000-memory.dmp

          Filesize

          1.2MB

        • memory/4020-16-0x0000000140000000-0x0000000140136000-memory.dmp

          Filesize

          1.2MB

        • memory/4132-0-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/4132-1-0x00000000023F0000-0x0000000002457000-memory.dmp

          Filesize

          412KB

        • memory/4132-7-0x00000000023F0000-0x0000000002457000-memory.dmp

          Filesize

          412KB

        • memory/4132-6-0x00000000023F0000-0x0000000002457000-memory.dmp

          Filesize

          412KB

        • memory/4132-15-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB