Resubmissions

09-04-2024 12:07

240409-paay5see45 9

09-04-2024 12:06

240409-n9qcfaee34 9

09-04-2024 12:06

240409-n9pqxahg7z 9

09-04-2024 12:05

240409-n9n5daee33 9

14-03-2024 04:54

240314-fjy8nadc63 10

Analysis

  • max time kernel
    536s
  • max time network
    1809s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-04-2024 12:07

General

  • Target

    3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe

  • Size

    45KB

  • MD5

    e533f92146fcacb8caca823882b8d304

  • SHA1

    fcb2b79d08e2fb7a58142faf7db2a36f142b309d

  • SHA256

    3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe

  • SHA512

    334b90d543b5835f88d3891c03fe78ac91c2569e47bfb11fbae58b9544fa569f411e4a2d8b57049a97f79afd51312eed57dd95c74b680331882ca77a46888c69

  • SSDEEP

    768:ygDUz4vSd32TINlRjiniKEc3dJ3Bwj+3p5SNUMNTEFiRQ:zUz4Kd320N+nir2FMN9NeiS

Score
9/10

Malware Config

Signatures

  • Contacts a large (4214) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4928-0-0x00000152DF880000-0x00000152DF88E000-memory.dmp

    Filesize

    56KB

  • memory/4928-1-0x00007FFDE26C0000-0x00007FFDE30AC000-memory.dmp

    Filesize

    9.9MB

  • memory/4928-2-0x00000152F9D20000-0x00000152F9D30000-memory.dmp

    Filesize

    64KB

  • memory/4928-3-0x00007FFDE26C0000-0x00007FFDE30AC000-memory.dmp

    Filesize

    9.9MB

  • memory/4928-4-0x00000152F9D20000-0x00000152F9D30000-memory.dmp

    Filesize

    64KB