Resubmissions

19/02/2024, 19:15

240219-xyhb5abh68 6

19/02/2024, 18:26

240219-w3ameaad9w 6

Analysis

  • max time kernel
    1451s
  • max time network
    1422s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/02/2024, 18:26

General

  • Target

    PID Key Checker/wyUpdate.exe

  • Size

    434KB

  • MD5

    37c753d5ab2dba14e7b7e1dc56b87c27

  • SHA1

    d6dfd70d391c4814ce8c4f2e8bf0c41e7deed1ee

  • SHA256

    aa71c676499260ed07b6b0e54aff155ad8e46b49aee933e90b5ff4dd098aadb6

  • SHA512

    0c96bfad6192c6a6d652ff7d4bd93bb13d7fd27e6ccc9a6200c235c833e5340d8e6d8f10937396a9c39b06dbb41a27348d031d55e3b8baa50cdcacaaffff41db

  • SSDEEP

    6144:YFnJRm+efxgsQWc2m8snsIa9rRLKX5Z1BfZ9e58UoEFXtf79VMUHZZgBRflKXB:YFnXmrsWcRIKf1sNo+gUHZmVsR

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PID Key Checker\wyUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\PID Key Checker\wyUpdate.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2556-0-0x00007FF9441C0000-0x00007FF944B61000-memory.dmp

    Filesize

    9.6MB

  • memory/2556-1-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/2556-25-0x000000001CC30000-0x000000001D0FE000-memory.dmp

    Filesize

    4.8MB

  • memory/2556-26-0x000000001D1A0000-0x000000001D23C000-memory.dmp

    Filesize

    624KB

  • memory/2556-27-0x0000000001710000-0x0000000001718000-memory.dmp

    Filesize

    32KB

  • memory/2556-28-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/2556-29-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/2556-30-0x000000001E710000-0x000000001E730000-memory.dmp

    Filesize

    128KB

  • memory/2556-34-0x00007FF9441C0000-0x00007FF944B61000-memory.dmp

    Filesize

    9.6MB

  • memory/2556-35-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/2556-36-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/2556-37-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB