Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 11:24

General

  • Target

    7cfd0d4209e8e8f2ecdc42aa72be7577.exe

  • Size

    11KB

  • MD5

    7cfd0d4209e8e8f2ecdc42aa72be7577

  • SHA1

    453b1e964fdb556f78807d92aa23b17a12b14c16

  • SHA256

    7b9cc0b7a062883da32170a24767d3e744f43afdca7ad6064f2a5aef3a055223

  • SHA512

    7c88ce000441f719ef0f8d69075f18fdbd3a911fd67680d3c65acaa70673ce2845ceb9a07aaf9ddf12e69e5383f0ff5db9b07c3c53c773e4b63be7f294e8ad71

  • SSDEEP

    192:auXUlU2kBE8mi1nKU8nKW6ouZC6rcxuJ/pSnmAbvzJQhbjpBS1mbDAVlDR:aUUWLBAU82oukuJ/pSnb2

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cfd0d4209e8e8f2ecdc42aa72be7577.exe
    "C:\Users\Admin\AppData\Local\Temp\7cfd0d4209e8e8f2ecdc42aa72be7577.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls C:\Windows\system32 /e /p everyone:f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows\system32 /e /p everyone:f
        3⤵
          PID:4044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
          3⤵
            PID:3276

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads