Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 13:19

General

  • Target

    9f052ffa940763ede6b28dc1ebd4757e.exe

  • Size

    654KB

  • MD5

    9f052ffa940763ede6b28dc1ebd4757e

  • SHA1

    0a4f3e7f6a573c0fe321ebf46aee344e08a28e25

  • SHA256

    c2361c29db867d86c9f6d361b3d3394d0d847775ebcb84422c095369ccde5acd

  • SHA512

    ebc566c0794b9edd8a7373636c065e3d67ee0156b33969a30950116b984cad81c352d96290cf4607fec7d3c2bf2e7a1d87f6231db6543a74df26da63ff5cbbbc

  • SSDEEP

    12288:c6bJhnrd2Qsm/+/dnGz7O0Y244sMYcoFMVyMg+Yy1Wcwemn58GVuv:ckJhngpn9kNsMwbMgkK58guv

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
    "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
      "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
      2⤵
        PID:2856
      • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
        "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
        2⤵
          PID:3052
        • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
          "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
          2⤵
            PID:2192
          • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
            "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
            2⤵
              PID:2368
            • C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe
              "C:\Users\Admin\AppData\Local\Temp\9f052ffa940763ede6b28dc1ebd4757e.exe"
              2⤵
                PID:2360

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2976-0-0x0000000000270000-0x000000000031A000-memory.dmp

              Filesize

              680KB

            • memory/2976-1-0x0000000074E70000-0x000000007555E000-memory.dmp

              Filesize

              6.9MB

            • memory/2976-2-0x0000000002140000-0x0000000002180000-memory.dmp

              Filesize

              256KB

            • memory/2976-5-0x0000000074E70000-0x000000007555E000-memory.dmp

              Filesize

              6.9MB

            • memory/2976-4-0x00000000004A0000-0x00000000004AA000-memory.dmp

              Filesize

              40KB