Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 07:13

General

  • Target

    55d1102e014ba1cc92b05932d7c238a8.exe

  • Size

    651KB

  • MD5

    55d1102e014ba1cc92b05932d7c238a8

  • SHA1

    b0a9eee4725231fc7125660824ffc37964f0dcb6

  • SHA256

    817418b9b21ae167e47047b460e4368bcdee462e816d341e660ef69289207cb8

  • SHA512

    4dd07ff76ba14f69a8ff00930e110bc70ed73242da6ed2b8e056e8b4a26cfb9fc5189cbf6bc9f6bbf5ea7580ee6c7e8c22b2d0fb476317d5e539ccba169e2fc8

  • SSDEEP

    12288:2JoBUgfKBl5MaGrE9RDgcxC8SET7okwWVyfjuKX888888888888W88888888888p:6oBUgu5MaGI9GcHSCok12b5O

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55d1102e014ba1cc92b05932d7c238a8.exe
    "C:\Users\Admin\AppData\Local\Temp\55d1102e014ba1cc92b05932d7c238a8.exe"
    1⤵
    • UAC bypass
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System policy modification
    PID:5536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5536-0-0x00000000022A0000-0x00000000022A1000-memory.dmp

          Filesize

          4KB

        • memory/5536-1-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/5536-3-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB