Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 18:10

General

  • Target

    DwmLutGUI.exe

  • Size

    41KB

  • MD5

    3b4757e1a391ad8afe84a433ea044335

  • SHA1

    1d04873b685e26377ed7be16f1dea43f149dd07e

  • SHA256

    5bd14307f344f802ba2a43f18b118cd15fd2056c2e01dfeaa7b16afbe637e280

  • SHA512

    a4f95040ebb2839b6f87dacd687e22110e6f02c5a7032f4d9645c20b4bfe58cd8fb39eec9e1c59f4cb7fb6e6a23aa89e06d16713fa5fed337f0b192353574a3a

  • SSDEEP

    768:Xu3QbzTyrqZmr3dYzBA9dMFciV5yQIXXFABQJVDDDDDRVDDDDDsetYcFwVc6K:XaQXurqZmr3dEKjit5yQIXVABQ0iwVcl

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DwmLutGUI.exe
    "C:\Users\Admin\AppData\Local\Temp\DwmLutGUI.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1688 -s 644
      2⤵
        PID:2864
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2504
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1
          2⤵
          • Runs ping.exe
          PID:1072

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1688-0-0x000000013FA00000-0x000000013FA0E000-memory.dmp

        Filesize

        56KB

      • memory/1688-1-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

        Filesize

        9.9MB

      • memory/1688-2-0x000000001BFC0000-0x000000001C040000-memory.dmp

        Filesize

        512KB

      • memory/1688-3-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

        Filesize

        9.9MB