Resubmissions

09/04/2024, 10:11

240409-l75m8scd58 9

09/04/2024, 10:09

240409-l6vfwacd37 9

09/04/2024, 10:09

240409-l6t54scd36 9

09/04/2024, 10:09

240409-l6tjksff51 9

13/03/2024, 02:34

240313-c2ncbsce29 10

Analysis

  • max time kernel
    486s
  • max time network
    1171s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240319-en
  • resource tags

    arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/04/2024, 10:09

General

  • Target

    9eaab6282fb6588621de05823543a2077277b7ac9404193bfc77819083ad58e6.exe

  • Size

    39KB

  • MD5

    3a3752bfa76ae16628e03d4a00b3e1c9

  • SHA1

    d5194572e7781aa893f84e59046bcc286d76ee62

  • SHA256

    9eaab6282fb6588621de05823543a2077277b7ac9404193bfc77819083ad58e6

  • SHA512

    0871580c12e9d941a152c9ec0124aae2a3f072484baf050d85a49bfd1147d8c151965c3f9779be6182fae218b0e1786b8c82cb90b29e5c88014ca8a9bcd01018

  • SSDEEP

    768:Qnbsx4iDVJLU0DA6Xlnw0ei1s8jdj6yV5SNUI:sbsx4oVjXC0ei1s8j6yaNJ

Score
9/10

Malware Config

Signatures

  • Contacts a large (4217) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9eaab6282fb6588621de05823543a2077277b7ac9404193bfc77819083ad58e6.exe
    "C:\Users\Admin\AppData\Local\Temp\9eaab6282fb6588621de05823543a2077277b7ac9404193bfc77819083ad58e6.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/864-0-0x000002F15F900000-0x000002F15F90E000-memory.dmp

    Filesize

    56KB

  • memory/864-1-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

    Filesize

    10.8MB

  • memory/864-2-0x000002F15FD40000-0x000002F15FD50000-memory.dmp

    Filesize

    64KB

  • memory/864-5-0x00007FFABC6A0000-0x00007FFABD162000-memory.dmp

    Filesize

    10.8MB

  • memory/864-6-0x000002F15FD40000-0x000002F15FD50000-memory.dmp

    Filesize

    64KB