Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 13:18

General

  • Target

    cb8253f0ef1a47ef8c9d9d7b1b4472aa.exe

  • Size

    579KB

  • MD5

    cb8253f0ef1a47ef8c9d9d7b1b4472aa

  • SHA1

    6b71c57f11026b4640bb07d5435d9db48b34cf57

  • SHA256

    a7ec2bd16c973cbf97d47e1fba4e0d1b2ae37854b59663f01cb994eed4c2eb74

  • SHA512

    50d80f3ee561191173f0f44fd5b903821445607916a8b3bbbec2d8389ab612e233935c64d09de48ee7fd1061624e85d5e1135aa11e7abcde2dc83dde97fb8c76

  • SSDEEP

    12288:yn7TgNSjH5sVNPPuJoZjCDb0NTjcXCOJakqP4sZ/bvDSwHLL9qWXKh6zeU:s7TPjH5sV9PyoZjmwNTkC7LzvDZMX0

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\cb8253f0ef1a47ef8c9d9d7b1b4472aa.exe
        "C:\Users\Admin\AppData\Local\Temp\cb8253f0ef1a47ef8c9d9d7b1b4472aa.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2172

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1136-2-0x0000000002A10000-0x0000000002A11000-memory.dmp

      Filesize

      4KB

    • memory/2172-3-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB

    • memory/2172-5-0x0000000000400000-0x0000000000495000-memory.dmp

      Filesize

      596KB