Analysis

  • max time kernel
    133s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 10:27

General

  • Target

    15e4355da97aef4cc5a5c0dd68bd88b4.exe

  • Size

    1.1MB

  • MD5

    15e4355da97aef4cc5a5c0dd68bd88b4

  • SHA1

    30b2f342d6327eb36307299f587aac4c31c5a92f

  • SHA256

    b076870279deb9537c8aa8f783d40d549a9ead03b187dbbecc0cfceae40b25c5

  • SHA512

    cf6ceff876a3376bdf540fafc3a6f882a89fc6de00f3b046e10f29b1e4c2404a6f3fe147c3f7d532fa841dfa3131c42868a36ab8f781b15d820438f786b4c243

  • SSDEEP

    24576:qK1KjeDkvdQcerQ0kOEqXGKQ3Tpr8HEtTa47GpZRW489:qw3Q09XWDDhY6arpZg4

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e4355da97aef4cc5a5c0dd68bd88b4.exe
    "C:\Users\Admin\AppData\Local\Temp\15e4355da97aef4cc5a5c0dd68bd88b4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          1KB

          MD5

          7ac7deb44246e75749f16e5d24190ee9

          SHA1

          d2591f14f0d2b128cb43abadf48d25a1b3bb2b35

          SHA256

          a2c942ba94d447ea3080faa40ec174672ee488d9aa298435999ce617325f017a

          SHA512

          cf8d896b541276abb5cb83835ada8ede62b7084d0accec64e84dd5e7a4d85c396bf48db48878bc3970b8e2d337d3ab82dce207a5c01ad22cbfcc42bdeec571de

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          2KB

          MD5

          8fd45fdefbbde3b28654afbaacb84e60

          SHA1

          7436b79b519d6e7b4e0ae5e9c0b4c1fbf66d01a1

          SHA256

          7543e812ab5bb9e76372f35cf545e26d880d7cf182434c673e8b57fd56522dd7

          SHA512

          72497b75f843784d287aef5696caf321e846c0dca1ce77adeff821b07318168d8363822fa9c462795c1522808aff82adb1a66be462b2c2562b5d67a1f9243bb6

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          3KB

          MD5

          b117754c09eb648032d9d3d258d630e7

          SHA1

          7771fb4e9b55ed54ae38131ee5c242fadf53cd02

          SHA256

          0fa70fd6f4f95d4a009cc30143d04a40553d02e04d19bac96cf71b8723410d6f

          SHA512

          8f10a7634a4978f824fe40f37bb2281f2c13a0716306ab6c9d4cef6bdf11d1b4924aa0310cf44443bf35faf7d9d277a1a7331ddd1ca08f0d205090cb89b722a3

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          3KB

          MD5

          35e6bf404c54912522f98c014e4a0d22

          SHA1

          32cd31a7e129469b530afb28d1b07412807d158a

          SHA256

          38d11057707bff3d34a6616107c6b0754c4b286d42d9af45e7c7a26bd4a2902c

          SHA512

          9c7bd7b1ead4ba940cf8305550d9afc45d864ab565335e7830c053c9999840de6c8dd34c1fed1a62b9206acba1f7e244871c3886d1a93e8e512f7245651dc4fc

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          8KB

          MD5

          edb65fc52a97df83c311767d63ef5a55

          SHA1

          c47333ddac8ebcfdd563f9ed8073021857847b62

          SHA256

          9b50f7770ea8c65709df9f77577e31af721ffc2af7c69db5c012297b7471522c

          SHA512

          6f86bbf0c10bc9f200ad43a6e38d88778660351b755d23c2738ce559b073406a0598f130108443193b2badce732cc1a7a4d3e56f5bb0759675986d982866ad4a

        • C:\ProgramData\BUFFERZONE Software Removal Tool\removal.log

          Filesize

          964B

          MD5

          b3119cd59a6b25c7aa305a19717e9d20

          SHA1

          04e8ca91be229033e4ed3edd57e2056d6a997372

          SHA256

          298893a357f0fb164565d74a4a25a833344cf8c89e843d8778097f51f08ebb25

          SHA512

          05fbc01e213ee94b8b37803a503d2ee4ffb18c919ba8fbdf129543fb7f3c395bda83d38c44245d8e1f56144811c2bfec0ff1e6d2f175da85c1c427ed917f5c82

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ek2bog0k.jdc.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/4152-0-0x0000023F06520000-0x0000023F06648000-memory.dmp

          Filesize

          1.2MB

        • memory/4152-32-0x00007FFA0AA40000-0x00007FFA0B501000-memory.dmp

          Filesize

          10.8MB

        • memory/4152-112-0x0000023F20C30000-0x0000023F20C40000-memory.dmp

          Filesize

          64KB

        • memory/4152-122-0x0000023F082A0000-0x0000023F082C2000-memory.dmp

          Filesize

          136KB

        • memory/4152-133-0x00007FFA0AA40000-0x00007FFA0B501000-memory.dmp

          Filesize

          10.8MB