Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2023 17:17

General

  • Target

    05152ca1613fe3191a389316ec830573.exe

  • Size

    19KB

  • MD5

    05152ca1613fe3191a389316ec830573

  • SHA1

    ab869fc2c7a61c695c6bdb4801e655e4195896f7

  • SHA256

    71f17c84652cd8a72bf0d19d1e23f6527a3d0823f2f0b1e7cb15183803876ee7

  • SHA512

    f0529a9c9c4faab6f888d5d86cbbe0cd235a7b20e3dd1d9fd3231014ca596d99fa555c170f70e3f72f0f9820cd362257482006bccebdb9249f448c1ed31f4fcb

  • SSDEEP

    384:XvZc7bntvCycq78fdqMQDgv4D8rJF6vvTxepLRsAkT2baAgVJ:27bn9DI6vdpAWJ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05152ca1613fe3191a389316ec830573.exe
    "C:\Users\Admin\AppData\Local\Temp\05152ca1613fe3191a389316ec830573.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3472

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3472-0-0x0000000074950000-0x0000000074F01000-memory.dmp
    Filesize

    5.7MB

  • memory/3472-1-0x0000000074950000-0x0000000074F01000-memory.dmp
    Filesize

    5.7MB

  • memory/3472-2-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-3-0x0000000074950000-0x0000000074F01000-memory.dmp
    Filesize

    5.7MB

  • memory/3472-4-0x0000000074950000-0x0000000074F01000-memory.dmp
    Filesize

    5.7MB

  • memory/3472-5-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-6-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-7-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-8-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-9-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB

  • memory/3472-10-0x0000000000A10000-0x0000000000A20000-memory.dmp
    Filesize

    64KB