Resubmissions

09-04-2024 12:07

240409-paay5see45 9

09-04-2024 12:06

240409-n9qcfaee34 9

09-04-2024 12:06

240409-n9pqxahg7z 9

09-04-2024 12:05

240409-n9n5daee33 9

14-03-2024 04:54

240314-fjy8nadc63 10

Analysis

  • max time kernel
    546s
  • max time network
    1797s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 12:07

General

  • Target

    3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe

  • Size

    45KB

  • MD5

    e533f92146fcacb8caca823882b8d304

  • SHA1

    fcb2b79d08e2fb7a58142faf7db2a36f142b309d

  • SHA256

    3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe

  • SHA512

    334b90d543b5835f88d3891c03fe78ac91c2569e47bfb11fbae58b9544fa569f411e4a2d8b57049a97f79afd51312eed57dd95c74b680331882ca77a46888c69

  • SSDEEP

    768:ygDUz4vSd32TINlRjiniKEc3dJ3Bwj+3p5SNUMNTEFiRQ:zUz4Kd320N+nir2FMN9NeiS

Score
9/10

Malware Config

Signatures

  • Contacts a large (4224) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3028-0-0x000002A893570000-0x000002A89357E000-memory.dmp

    Filesize

    56KB

  • memory/3028-1-0x00007FFC2C730000-0x00007FFC2D1F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3028-2-0x000002A8ADAB0000-0x000002A8ADAC0000-memory.dmp

    Filesize

    64KB

  • memory/3028-5-0x00007FFC2C730000-0x00007FFC2D1F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3028-6-0x000002A8ADAB0000-0x000002A8ADAC0000-memory.dmp

    Filesize

    64KB