Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2023 20:49

General

  • Target

    2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe

  • Size

    72KB

  • MD5

    1c298039c674d1243bffd7189636b229

  • SHA1

    305a79eb4d2c48edc2c11765b1d6e8b418d74fef

  • SHA256

    2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7

  • SHA512

    174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8

  • SSDEEP

    384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4596-0-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4596-1-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4596-2-0x0000000001290000-0x00000000012A0000-memory.dmp

    Filesize

    64KB

  • memory/4596-4-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4596-5-0x0000000075530000-0x0000000075AE1000-memory.dmp

    Filesize

    5.7MB