Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 05:15

General

  • Target

    2997278414e197a28302ad9ea47eb268.exe

  • Size

    18KB

  • MD5

    2997278414e197a28302ad9ea47eb268

  • SHA1

    c327c91f060ab3bfe86c5fc931052e5a12907e73

  • SHA256

    bc2f44a9ff007f22b879107b65136729e884133a55a40aa5450eb74900657db9

  • SHA512

    a8c23f8c4e1578ee66406b5e873cfc3552423a4bf19ac1362e15086872602ef61ce230847546f2cfdaeac15cc7b51feadc6a0493b45d92ff0485b87aa8ba798a

  • SSDEEP

    384:UDU+ESh+Rs3pNaweGxiEV5N50bMAKfVQ9M7bIv6UGTnz/1Ro3:luh+RW44F5N5jAKfVQ9Mgv6FP90

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1836 -ip 1836
    1⤵
      PID:4236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 316
      1⤵
      • Program crash
      PID:4876
    • C:\Users\Admin\AppData\Local\Temp\2997278414e197a28302ad9ea47eb268.exe
      "C:\Users\Admin\AppData\Local\Temp\2997278414e197a28302ad9ea47eb268.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1836

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1836-0-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/1836-3-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/1836-2-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/1836-1-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/1836-4-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB