Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 17:48

General

  • Target

    3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe

  • Size

    1.2MB

  • MD5

    72a61b8c958d2586e6e05f7f10c35d19

  • SHA1

    7fdc5f80aebb3824a1e972dfb6295687c082e359

  • SHA256

    3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496

  • SHA512

    712c5409cabb62ddc5fa53f396d23b73056d22e61a264831074720711f9e08435ffb21c482010994db6ca3d156750b45a857ad80be0b2a0bccfb5645113b562f

  • SSDEEP

    24576:2tCvHw5GID1GswToAyxe2Ukq/u9AAifTrri4wF6:ICNIDg1TVyxe/keua/Trr2F6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa54b7a560d523c2374919bbe22ef7b5cdddbab726f41c9f00da383a3944496.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2032
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:2932

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\alg.exe

          Filesize

          661KB

          MD5

          c44626e299c329dea10417c962c4722d

          SHA1

          c7dffc37bc419d782cb2dfd39c819bf9c1680673

          SHA256

          5e5705ae7b6883b658cbf0766f119753551fce9b25cb438dee6597d81573ab8a

          SHA512

          0bbe9e61dbfd68c5311fcc954366f3764c1af187c72ba3e6b59fdb38f942856e4344b958911e908a04f56821eba9ee2c62df1777a0fb623d3b66ce6e4aa26cff

        • memory/2032-0-0x0000000000400000-0x000000000053D000-memory.dmp

          Filesize

          1.2MB

        • memory/2032-1-0x00000000022C0000-0x0000000002327000-memory.dmp

          Filesize

          412KB

        • memory/2032-6-0x00000000022C0000-0x0000000002327000-memory.dmp

          Filesize

          412KB

        • memory/2032-7-0x00000000022C0000-0x0000000002327000-memory.dmp

          Filesize

          412KB

        • memory/2032-14-0x0000000000400000-0x000000000053D000-memory.dmp

          Filesize

          1.2MB

        • memory/2932-15-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB

        • memory/2932-16-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB