Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:51

General

  • Target

    04e0472cb4a6c17aa42534bb45747cca.exe

  • Size

    16KB

  • MD5

    04e0472cb4a6c17aa42534bb45747cca

  • SHA1

    b79543bb684274800193c662bd035f265eab0bc4

  • SHA256

    b43a9bd69055dec5cd2746cb5422de4689db9df97b44eb46ded079d4fac9cbf0

  • SHA512

    a4c5c8deecd025a56e414da92eee2638d81272e6bd654ed240a82c9eeb382dd0c61dec29f86d563d26e427ed3ebe524a835985700e199314e1cdb232732980bb

  • SSDEEP

    384:S0M/+wsgWQJ3q60mHgU0HOt1R06XA+oRl3:NBgW4BHgfOt1yD

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04e0472cb4a6c17aa42534bb45747cca.exe
    "C:\Users\Admin\AppData\Local\Temp\04e0472cb4a6c17aa42534bb45747cca.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2512-0-0x000000013F8B0000-0x000000013F8B8000-memory.dmp

    Filesize

    32KB

  • memory/2512-1-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2512-2-0x0000000000550000-0x0000000000558000-memory.dmp

    Filesize

    32KB

  • memory/2512-3-0x0000000002390000-0x0000000002410000-memory.dmp

    Filesize

    512KB

  • memory/2512-4-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2512-5-0x000007FEF5300000-0x000007FEF5CEC000-memory.dmp

    Filesize

    9.9MB