Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2023 09:11

General

  • Target

    120813222.exe

  • Size

    613KB

  • MD5

    0ca209d46c8a44a4ca29c376abb70c69

  • SHA1

    956173accb5fef0ad526bfe2bbb6b678f18a4cd7

  • SHA256

    1cac5521f95cb33284395dd2ac33d78a747bca7eab4497b76913e0e92a5ae07e

  • SHA512

    88d27c08a4af468d5007fe54e7bdc81d161d0b8c9ebcc9608aa0d6aba8cb9a998b9a2108a5089009191dd8e44f4cd16b91ee6cc786d50f4849e53271004e24f7

  • SSDEEP

    12288:sU6lyrjRN0bsEhz1OX5ndrv1bQ4jfE9N9vIDc/JUnWM9SM/lnEyjwQa:sUvhibsEZOJndrvu4bE9AD3nqM/+h

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\120813222.exe
    "C:\Users\Admin\AppData\Local\Temp\120813222.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\XWRtm00_{FC471E17-C53A-2AF8-0237-CDC69D5167C3}.dll

    Filesize

    87KB

    MD5

    d633687ef0777c7aa5715d4339977260

    SHA1

    a23638d058a08f4399e42bf4a373a5fdc5b13333

    SHA256

    cdcb4a3be3f322dc961996d50220fb23a093ef6e7875764dd1867f33fd5fa8d8

    SHA512

    5b46aba6bade1823559c25b8e9eef30d3400d892a0173c8f3b4e8111d0639e7265cb7ac33a02f0853d4b148876c53b554038ce6d1ba4abdf0edaa05d8023a3e0

  • memory/1952-0-0x000000013FA80000-0x000000013FB1E000-memory.dmp

    Filesize

    632KB

  • memory/1952-1-0x000007FEF52F0000-0x000007FEF5CDC000-memory.dmp

    Filesize

    9.9MB

  • memory/1952-2-0x0000000000970000-0x00000000009C4000-memory.dmp

    Filesize

    336KB

  • memory/1952-3-0x000000013FAFB000-0x000000013FAFC000-memory.dmp

    Filesize

    4KB

  • memory/1952-18-0x000007FEF52F0000-0x000007FEF5CDC000-memory.dmp

    Filesize

    9.9MB