Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 01:08

General

  • Target

    3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282.exe

  • Size

    2.2MB

  • MD5

    e817cc929fbc651c5bdab9e8cca0d9d9

  • SHA1

    4d73dc2afcde6a1dcf9417c0120252a2d8fd246f

  • SHA256

    3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282

  • SHA512

    a9c1e547ef74c20e0a21dfc951463fb6883a23da4c323c96c5e64ac5793e774ceae898d4cf486e1bf1ea8fb69360610639a1046005fcdb9bd9f8463aec4a3e2f

  • SSDEEP

    49152:Znv1H6cOicCqvWtLfr1/7IBSWCRBClm7gXKxfsvX7TXL:XHLhbQsV/7bRBClagXnv77

Score
9/10

Malware Config

Signatures

  • Detects executables packed with SmartAssembly 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282.exe
      "C:\Users\Admin\AppData\Local\Temp\3a7327bd54ba0dfa36bbf0b9d0dc820984d6d0e0316cfa4045ab4c1e7e447282.exe"
      2⤵
      • Adds Run key to start application
      PID:3328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2216-0-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/2216-1-0x0000000000F40000-0x0000000001180000-memory.dmp

    Filesize

    2.2MB

  • memory/2216-2-0x0000000005070000-0x000000000528C000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-3-0x0000000074ED0000-0x00000000755BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-4-0x0000000006290000-0x00000000064AE000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-5-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-13-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-17-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-28-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-34-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-38-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-36-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-32-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-30-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-26-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-24-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-52-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-22-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-20-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-18-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-64-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-14-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-10-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-68-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-8-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-6-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-40-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-66-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-62-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-60-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-58-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-56-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-54-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-50-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-48-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-46-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-44-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-42-0x0000000006290000-0x00000000064A8000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-4891-0x0000000074ED0000-0x00000000755BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-4893-0x0000000000D20000-0x0000000000D6C000-memory.dmp

    Filesize

    304KB

  • memory/2216-4892-0x0000000000C80000-0x0000000000CD8000-memory.dmp

    Filesize

    352KB

  • memory/2216-4894-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/2216-4895-0x0000000074ED0000-0x00000000755BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-4896-0x0000000004850000-0x00000000048A4000-memory.dmp

    Filesize

    336KB

  • memory/2216-4918-0x0000000074ED0000-0x00000000755BE000-memory.dmp

    Filesize

    6.9MB