Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:09

General

  • Target

    2bfaee852e08aab42e428b3d00161b7f.exe

  • Size

    460KB

  • MD5

    2bfaee852e08aab42e428b3d00161b7f

  • SHA1

    6900b0c897b854703d1797829f1e1af5a72e598e

  • SHA256

    24dc083c9883f021c9bf61af64ab3f4a1fb792a8c7f07bf24f971bbf5dd953a0

  • SHA512

    d372dc10e5a4940cb84de8c9bc2cf0bd88e7b405b519805d11beaff1962a1beb44403faed7a8401cf880b11ae54e6f9207a3e6a25493231201677982d4eaa375

  • SSDEEP

    6144:TicvOQeLa8kstjCNwamyRnMP4hMa/E3QPx7yTo0Erp1RgYTiFGQxf3R397jNGtb/:WcxqxJYMPKE3u8uiFGQzXIj

Score
1/10

Malware Config

Signatures

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bfaee852e08aab42e428b3d00161b7f.exe
    "C:\Users\Admin\AppData\Local\Temp\2bfaee852e08aab42e428b3d00161b7f.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/220-1-0x0000000000F00000-0x0000000000F10000-memory.dmp

    Filesize

    64KB

  • memory/220-0-0x00000000752F0000-0x00000000758A1000-memory.dmp

    Filesize

    5.7MB

  • memory/220-8-0x00000000752F0000-0x00000000758A1000-memory.dmp

    Filesize

    5.7MB