Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 07:24

General

  • Target

    60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe

  • Size

    84KB

  • MD5

    7ebb9e8aac25383f90935829f5a71d1f

  • SHA1

    08bfa85657fc1b13a3abf9f82f6d3ab4bb601356

  • SHA256

    60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae

  • SHA512

    49e6b507cf399e0b61341726420d5960af83601088241f51f2f572b8e42f8afcc125acb316480ac4d53db7fc0b8a4e824360270ce5b1f9d7a3bbde5c1907949f

  • SSDEEP

    1536:ds14tp3GlPnlr0tlECrHxK4W4lXpY3s2C4z2AlTT6JdsilqpHOelMAXXWmMKDPWY:dJtp3GlPnlr0tlECrHxK4W4lXpY3s2Ce

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe
    "C:\Users\Admin\AppData\Local\Temp\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c C:\Users\Admin\AppData\Roaming\TeamViewer\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Roaming\TeamViewer\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe
        C:\Users\Admin\AppData\Roaming\TeamViewer\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\TeamViewer\60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae.exe

    Filesize

    84KB

    MD5

    7ebb9e8aac25383f90935829f5a71d1f

    SHA1

    08bfa85657fc1b13a3abf9f82f6d3ab4bb601356

    SHA256

    60465c4b0954167db3196ab5aa5194eed5e3f78fbbcb550ce65285e1cee47aae

    SHA512

    49e6b507cf399e0b61341726420d5960af83601088241f51f2f572b8e42f8afcc125acb316480ac4d53db7fc0b8a4e824360270ce5b1f9d7a3bbde5c1907949f

  • memory/3940-8-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/3940-9-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/3940-12-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/3940-13-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/3940-14-0x00000000011B0000-0x00000000011B6000-memory.dmp

    Filesize

    24KB

  • memory/5004-0-0x00007FFC74863000-0x00007FFC74865000-memory.dmp

    Filesize

    8KB

  • memory/5004-1-0x0000000000F80000-0x0000000000F9C000-memory.dmp

    Filesize

    112KB

  • memory/5004-2-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/5004-3-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB

  • memory/5004-11-0x00007FFC74860000-0x00007FFC75321000-memory.dmp

    Filesize

    10.8MB