Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 22:05

General

  • Target

    60607c5ba9a47538be92dc757d238722bd31029ada9da9924885978fc459f270.exe

  • Size

    52KB

  • MD5

    88b5ca41701ea3475f07184c518337a7

  • SHA1

    01b1705f43fe20147f5ab820cd2ffa963277568d

  • SHA256

    60607c5ba9a47538be92dc757d238722bd31029ada9da9924885978fc459f270

  • SHA512

    3672f6c15d9a00e1f53c4e428b4b0bb89464a1f538df6cc431df4c8752a31021a7e00ace858178a0a8545a1aa4e436da31aeb22c74fe3ab8de2bdbc71279e8e6

  • SSDEEP

    768:w37zj55N7fnokbb/RjUtS0xWboBK4hlHj5UUfoE83E:wj55NzBv/1oc4hlHj5XoE2E

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60607c5ba9a47538be92dc757d238722bd31029ada9da9924885978fc459f270.exe
    "C:\Users\Admin\AppData\Local\Temp\60607c5ba9a47538be92dc757d238722bd31029ada9da9924885978fc459f270.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{F3E341ED-DBFC-13B5-869D-5DE2D913DBFC}" /f
      2⤵
        PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\60607C~1.EXE > nul
        2⤵
          PID:2764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads