Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2023 19:29

General

  • Target

    OBS Studio.exe

  • Size

    3.2MB

  • MD5

    4c4ed732b2f8920eb1d38bb7d3f893ce

  • SHA1

    bcbd6a273061eeddc6ec064a1aa56d931b99c264

  • SHA256

    54db894c7f0f1c8da3f2cce3aea1a4cd5caeee129b90c502dde4a68e9fa811eb

  • SHA512

    03998ac9930715f582aed72ff509603f65fcb16c579e5405a6cf24258480bebee3f053af44771e70ff005abbfc228081fc4f956471503e9c9dac1369c06e3eba

  • SSDEEP

    49152:PRITIz6d3NegiA4Qw/dD6oYRxKP3c6x8ET5daZ5LUbuOeY5RGaw+W7SCUys8O7ou:5kdBfQdmbKP3Ym5daZdjObRw49c

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OBS Studio.exe
    "C:\Users\Admin\AppData\Local\Temp\OBS Studio.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c650c678b2494bf6bf0e109caf4c14e

    SHA1

    b811adb3abdda146ac09290feb585fd43a8669ea

    SHA256

    14bbea93c8e98019e8352838780081acdb44ca52bd3fa965f7df8bb392b28a33

    SHA512

    a238958c4d4e9a4e7c796b6e64b172d40e535690a4df5b7fe47155495f0d6ebed99f6c9f82bed0bbf953ac8b33e62de50b47484e1ef09effff778656f77f273a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    e40a833702a07a1c90e941dd04c459f5

    SHA1

    4a36e8fab0aa5c0e3c6cbf5268a60c2e73b9de23

    SHA256

    a54ccb7e6d9006c4264e56060391d7020198240d692f84bf3a3bccea7c4a53ad

    SHA512

    ea218534492c8f31ee72cfb14867924b04fb65e38dd5a8a8698f37a27c9000aac0b1d22257e631cf3172ee087ff01192a0a5907cd3ade017874e13ad9fb8358f

  • C:\Users\Admin\AppData\Local\Temp\Tar36CE.tmp

    Filesize

    33KB

    MD5

    daf93ed649f1974e069f0d175a2ee1b5

    SHA1

    f82a55c88d39dddf8611779833b8df811581b97b

    SHA256

    cbaad09a8d95722db3fadfbf4998f32d3d850f1b14b94990083a4b57ed668b30

    SHA512

    b9258fba1b1204917179e7d878983945e9cde51c0d19196467583e086df05180a721ad8b4210aa42808615bef0b72f462fd3dbedca4a0b38647320e2b5ee6e67

  • memory/2040-4-0x000000001BEF0000-0x000000001BF70000-memory.dmp

    Filesize

    512KB

  • memory/2040-0-0x0000000001260000-0x0000000001594000-memory.dmp

    Filesize

    3.2MB

  • memory/2040-3-0x000000001C6B0000-0x000000001CA86000-memory.dmp

    Filesize

    3.8MB

  • memory/2040-2-0x000000001BEF0000-0x000000001BF70000-memory.dmp

    Filesize

    512KB

  • memory/2040-1-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2040-91-0x000007FEF5410000-0x000007FEF5DFC000-memory.dmp

    Filesize

    9.9MB

  • memory/2040-92-0x000000001BEF0000-0x000000001BF70000-memory.dmp

    Filesize

    512KB

  • memory/2040-93-0x000000001BEF0000-0x000000001BF70000-memory.dmp

    Filesize

    512KB