Analysis

  • max time kernel
    122s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2024 16:27

General

  • Target

    3e76bf1a6f5ed603dfd632041f144153.exe

  • Size

    9KB

  • MD5

    3e76bf1a6f5ed603dfd632041f144153

  • SHA1

    434f2393f58225c2cfa7888d1e8055011ae4b67b

  • SHA256

    8460550de9a6423044140fc3c8f322b9bd35c24277455d879b792fd7edf88f40

  • SHA512

    34d278f0a964195e518ce3308a69a9f44a25bec18924a43c20e74b4d8065629b7f3059e64a9fac2c42af73f74e7a0dd64e6c586b90a343553c4f5b8ef96e6049

  • SSDEEP

    192:+Bksub9MuIOieMZZ35a93Vnjdwqzl3+Fedi:vl7ieM16FnhwqBLd

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e76bf1a6f5ed603dfd632041f144153.exe
    "C:\Users\Admin\AppData\Local\Temp\3e76bf1a6f5ed603dfd632041f144153.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2104 -s 904
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2104-0-0x0000000000B70000-0x0000000000B78000-memory.dmp

      Filesize

      32KB

    • memory/2104-1-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

      Filesize

      9.9MB

    • memory/2104-2-0x000000001B690000-0x000000001B710000-memory.dmp

      Filesize

      512KB

    • memory/2104-3-0x000007FEF5690000-0x000007FEF607C000-memory.dmp

      Filesize

      9.9MB