Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 00:36

General

  • Target

    6404f89198b1eee93328f062293ac98d.exe

  • Size

    233KB

  • MD5

    6404f89198b1eee93328f062293ac98d

  • SHA1

    34fd70acf947419f77248798908887959f9c32e0

  • SHA256

    b3d7d84fdb577210c31c658c11419abc206c88cc3f59e2f3409971097c41ac18

  • SHA512

    ce76ee3191367bb499f1d73a8a19f0a6907bc7e567ba01b42de70c260a52724ea6ad2d2e6332600d27f962979c96b7b6bf39541a21f228f2c3dc62aab3225181

  • SSDEEP

    6144:P+fAz16PHyf+TyBFHOCV1rmoOB/9wiX+BoRfK78S:P+Iz16fjoFHHrPiXrRI8S

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6404f89198b1eee93328f062293ac98d.exe
    "C:\Users\Admin\AppData\Local\Temp\6404f89198b1eee93328f062293ac98d.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 988
      2⤵
      • Program crash
      PID:3000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1280 -ip 1280
    1⤵
      PID:3576
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4260
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4436

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\7-Zip\7-zip.chm

        Filesize

        345KB

        MD5

        d55a14af4ec34e900872515121085954

        SHA1

        c70223e39cd271c0b61fe944ecb4989b4001878e

        SHA256

        04da054b37ed26075733f88cf92f0c08f259780a1402a85f2c10f0151bf74530

        SHA512

        7ab44eaee8e1aaf62ff1f45662f474571c441831ada0b74cae2408afbdf368cbae19d1ac020f21a372e5c8f590feb994df9a60db58caf453a81d8ca8b7e51523

      • C:\Program Files\Java\jre-1.8\lib\ext\nashorn.jar

        Filesize

        5B

        MD5

        b5b682b742431a52ea8b17c72ad9c572

        SHA1

        326320f469235708c59f678c9a7357dca552d306

        SHA256

        30d9045a9f172208b13161d1f5204e5787e5e07bfbb4f490d0041b03b7f44f76

        SHA512

        4e1bd7cc616b3115baf6be7ebd29fe2d1123bc0f25464865a0cf9207b0344fba70747a5ce6f00e8d9c696881f6db1e12f81736bc748b6f2b60bf84c681a49163

      • memory/1280-0-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/1280-2287-0x0000000000400000-0x000000000040A000-memory.dmp

        Filesize

        40KB

      • memory/4436-2304-0x0000020D0DD70000-0x0000020D0DD80000-memory.dmp

        Filesize

        64KB

      • memory/4436-2288-0x0000020D0DC70000-0x0000020D0DC80000-memory.dmp

        Filesize

        64KB

      • memory/4436-2320-0x0000020D160E0000-0x0000020D160E1000-memory.dmp

        Filesize

        4KB

      • memory/4436-2322-0x0000020D16110000-0x0000020D16111000-memory.dmp

        Filesize

        4KB

      • memory/4436-2323-0x0000020D16110000-0x0000020D16111000-memory.dmp

        Filesize

        4KB

      • memory/4436-2324-0x0000020D16220000-0x0000020D16221000-memory.dmp

        Filesize

        4KB