Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 01:52

General

  • Target

    e07ceb5807b100b9df862420f3c6a04f.exe

  • Size

    48KB

  • MD5

    e07ceb5807b100b9df862420f3c6a04f

  • SHA1

    450562a6b931a9143f640ce200f9733b3104392c

  • SHA256

    974ed13b6dfc392b598cf9aeb8fb4362f87c119344fdaf30b2e1e75af55e2976

  • SHA512

    57e3dff45cb692cb2bd6fb4d181d22a9e485a4a506e991ebbb5897e9660d752bcd48c6a4e981db2ac44fc7e3570247eef922205c1248357378589fb131cfb4de

  • SSDEEP

    768:UmO14SkQTctV5h8OBxr4NdM7cRyp3Rs/kkWPAW4S3aU60UGJyKTKgR8ORF37oK3i:5c4Z0OBB4NCARMs/k1cNGJthRhRF376f

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e07ceb5807b100b9df862420f3c6a04f.exe
    "C:\Users\Admin\AppData\Local\Temp\e07ceb5807b100b9df862420f3c6a04f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3232
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 540
      2⤵
      • Program crash
      PID:2648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3232 -ip 3232
    1⤵
      PID:5840

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3232-0-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/3232-1-0x00000000004F0000-0x0000000000502000-memory.dmp

      Filesize

      72KB

    • memory/3232-2-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/3232-3-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/3232-4-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/3232-6-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/3232-5-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB