Analysis

  • max time kernel
    1469s
  • max time network
    1494s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-05-2024 00:17

General

  • Target

    rrrr/STRESS TEST/TestMem5 v0.12 (Many configs repackaged)/TM5.exe

  • Size

    32KB

  • MD5

    c5cd49bcf5fc17944383d387638c955e

  • SHA1

    13122d07d828637943ca7e8043f77beca4e76928

  • SHA256

    b7ed4b39de012e88ec9ad7f21b0ac68a4e863fe078b5c54857a16d37d480cc21

  • SHA512

    7bc066b43804dad6b346c375efae121c6047ae37cbf1238b1e54ebd045e90daa55cb0f9db239c9d1ac6bf31bb7a48558658ef70fe3c0492cea278de0f5cbbdc5

  • SSDEEP

    768:0abgunPJRyK4QjjuWnXe784mX3XUVPrRG:0GxPJRyKPuWnOwhX3XUpRG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
    "C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3888
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:492
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3336
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3764
    • C:\Users\Admin\AppData\Local\Temp\rrrr\STRESS TEST\TestMem5 v0.12 (Many configs repackaged)\TM5.exe
      
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5064-1-0x0000000002D10000-0x0000000002DF1000-memory.dmp

    Filesize

    900KB

  • memory/5064-2-0x0000000004440000-0x00000000044D6000-memory.dmp

    Filesize

    600KB

  • memory/5064-15-0x0000000004440000-0x00000000044D6000-memory.dmp

    Filesize

    600KB

  • memory/5064-14-0x0000000002D10000-0x0000000002DF1000-memory.dmp

    Filesize

    900KB