Analysis

  • max time kernel
    2s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 14:45

General

  • Target

    26a4cc77158f9831700134eec96ca21b.exe

  • Size

    1.0MB

  • MD5

    26a4cc77158f9831700134eec96ca21b

  • SHA1

    ee5bfa49951d84e05d27aec2b1f19c5b88b8acae

  • SHA256

    96c1c6295f81ac18829b4d79cb9a2c199cc536ff653707d0f14a3f575773b986

  • SHA512

    dd30ffd73e954c5e21a846b783158b2055c42dba9474537cf4a364fa31ca7e5f1b6f7595b8a502dbe92f187d52bff240af39d8eed02ed2a00a9e7ecad087df16

  • SSDEEP

    24576:ibSaE4mvt/2WPvOzmheRU8OzlKWn3rkeMe:ibSv4mvcWPWzmheRpOxHn3rV

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26a4cc77158f9831700134eec96ca21b.exe
    "C:\Users\Admin\AppData\Local\Temp\26a4cc77158f9831700134eec96ca21b.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
        PID:2308
        • C:\Users\Admin\AppData\Local\Temp\ebfcabfbcdhd.exe
          C:\Users\Admin\AppData\Local\Temp\ebfcabfbcdhd.exe 1/7/8/0/0/1/3/7/4/0/6 LklBRD02MCkuIClSTjpQSUM6KRwvSERNT09SSkY9OTAaLj1BU1RIQTYtMTEwLBgvQ0hBNiwgKU9LR0RVQlFYRUQ3MC8xNCAuUD5OVj9RWE1STDxlbXBwNC4oa3J2LUE+T0snU0hILUFPTSdFTkBOGSdDTEhAREVENzEwLjIxMi8qMDMaLj0pPTYzLykcLz4xNiUxIC5BLDktKx8oPDQ9LC4ZK0QvPCYpIC9PT0hAVT1TWEhSSVU+PFU9Gi5JSk9EVEBNW0VPSzo1IC9PT0hAVT1TWEZBTUQ6GStFUkRYTVJMPB0oQVg/XjxFRExISz45IClHSEtUX0FPSFNTP1E2LSAvU0U6SktTTk5XVVJLOhkrVkc8KxgvRFIuNhwvTFRHTElNRFxQQUw9TkY9SU1ARD5RUkY8GSdJU15PTkpUQ0w+NXRydGIZK1I/U05KTklNRFhRUz9RWDxBWVI6KxwvQkg9PVg9MB0oRVNZQ1JGQU1IQFhBTj1RUkhURUM6X11sbWQZJ0RPVktFS0E+XkJIPTE4MCcuMTItKi00LjcxGStUQ0w+NTE0MTYpNTUvMy4YL0ROVEdITztDWExJTUQ6LSsxLy4rKDE1KS4pNjUzOSktKkFMHShRQTdWYF10JTFjKioxLS0tIyhsaGtudC1hbW4hIC9UT0U5aG5zaR0zYSQvXyEyYGZebC4wMC8tZi5jbV9nJTJlT25qVGNsXjxvd21paF1kR2BnWWdlcVxdYXBmbnIdMmYwMSs1MCsyLDA2JTFjKjAyMy8qKzM4NSIrYjEuMTIoMTMyNS8hM2A2LjE0OTYyMTM3M1hAOnJNUz4tXXpPdkU7Y3JIU2wxSz1uckNTd2VWc1VzRlNOakgyai5ETjlcSmNfdE1CaGlFVm5rUmRwa1lDbDFLTkBxQ2lvckhMa3ZFaENfWEdvakdlc15iK0puT1Jo
          3⤵
            PID:224
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81703580019.txt bios get serialnumber
              4⤵
                PID:3832
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 856
                4⤵
                • Program crash
                PID:1340
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic /output:C:\Users\Admin\AppData\Local\Temp\81703580019.txt bios get version
                4⤵
                  PID:1768
                • C:\Windows\SysWOW64\Wbem\wmic.exe
                  wmic /output:C:\Users\Admin\AppData\Local\Temp\81703580019.txt bios get version
                  4⤵
                    PID:4796
                  • C:\Windows\SysWOW64\Wbem\wmic.exe
                    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703580019.txt bios get version
                    4⤵
                      PID:2196
                    • C:\Windows\SysWOW64\Wbem\wmic.exe
                      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703580019.txt bios get version
                      4⤵
                        PID:4952
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 224 -ip 224
                  1⤵
                    PID:1400

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/2180-0-0x00007FFDAC1D0000-0x00007FFDACB71000-memory.dmp

                    Filesize

                    9.6MB

                  • memory/2180-1-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2180-17-0x000000001C000000-0x000000001C078000-memory.dmp

                    Filesize

                    480KB

                  • memory/2180-93-0x00007FFDAC1D0000-0x00007FFDACB71000-memory.dmp

                    Filesize

                    9.6MB