Resubmissions

09-04-2024 12:18

240409-pgkf6aaa5v 9

09-04-2024 12:17

240409-pgjvmaaa5t 9

09-04-2024 12:17

240409-pghybsef79 9

09-04-2024 12:17

240409-pghbssaa41 9

05-03-2024 10:59

240305-m3djmaea78 10

Analysis

  • max time kernel
    573s
  • max time network
    604s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-04-2024 12:17

General

  • Target

    Purchase Order No. 4500146827.exe

  • Size

    25KB

  • MD5

    cec230139ad2745a9fc15e02c6542e2d

  • SHA1

    a32f05f294ee6ba0e713aa619f63bac3929c0bc8

  • SHA256

    64887897dd3a2b278418cb096f83d7d1bf7ced1c118fef716bd8c6ec4fe91050

  • SHA512

    f88ae9ea244ab2ffbba3069eaeeb9d96b3c91d840999b47eab5e2475a3f6f9aa5d21d3854480716cfd7738ad6f37a69d7f1c2b9a53b05099952322b9cc99bca8

  • SSDEEP

    768:6YTLFV/TIo3J4bqBLW29ydo6fy+tJ1amp:6aLFVRJgu79UoK1amp

Score
9/10

Malware Config

Signatures

  • Contacts a large (3704) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4500146827.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order No. 4500146827.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3776-0-0x00000282F7180000-0x00000282F718A000-memory.dmp

    Filesize

    40KB

  • memory/3776-1-0x00007FFCC2F10000-0x00007FFCC38FC000-memory.dmp

    Filesize

    9.9MB

  • memory/3776-2-0x00000282F9880000-0x00000282F9890000-memory.dmp

    Filesize

    64KB

  • memory/3776-3-0x00000282F9880000-0x00000282F9890000-memory.dmp

    Filesize

    64KB

  • memory/3776-4-0x00007FFCC2F10000-0x00007FFCC38FC000-memory.dmp

    Filesize

    9.9MB

  • memory/3776-5-0x00000282F9880000-0x00000282F9890000-memory.dmp

    Filesize

    64KB

  • memory/3776-6-0x00000282F9880000-0x00000282F9890000-memory.dmp

    Filesize

    64KB