Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 16:26
Behavioral task
behavioral1
Sample
AdamxTweakingUtilityVersion10.04.23.exe
Resource
win7-20231201-en
General
-
Target
AdamxTweakingUtilityVersion10.04.23.exe
-
Size
14.7MB
-
MD5
007c895e193a8d123836c1a2e065ce55
-
SHA1
9698bf6d00ba857ae3509b146f5679a5f3f063a1
-
SHA256
2573e100d0ada48bd0cd45122b6b519579113db03ddbdc5c14a8f4b828d40285
-
SHA512
caf3526f85f6217377c99a385773ee31de65e122f0e64508ec5309fdbee80645b22625eb7ba443f1944f5f2e006aa479d233e21d9a9041f199e7333a9a516627
-
SSDEEP
393216:QJBtXiIE7YoPQJidQuslSq99oWOv+9fg+bUb7Vf:QJBts7rPQwdQuSDorvSY+bWV
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2472 AdamxTweakingUtilityVersion10.04.23.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2472 2524 AdamxTweakingUtilityVersion10.04.23.exe 28 PID 2524 wrote to memory of 2472 2524 AdamxTweakingUtilityVersion10.04.23.exe 28 PID 2524 wrote to memory of 2472 2524 AdamxTweakingUtilityVersion10.04.23.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdamxTweakingUtilityVersion10.04.23.exe"C:\Users\Admin\AppData\Local\Temp\AdamxTweakingUtilityVersion10.04.23.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\AdamxTweakingUtilityVersion10.04.23.exe"C:\Users\Admin\AppData\Local\Temp\AdamxTweakingUtilityVersion10.04.23.exe"2⤵
- Loads dropped DLL
PID:2472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989