Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-06-2024 16:52

General

  • Target

    NetLimiterPatch/NLSvc.exe

  • Size

    24KB

  • MD5

    2edf1a304a5ee46d191cb6ac4c1a7624

  • SHA1

    3540e441f9ddc24034b29a308af97bbaa4f2638b

  • SHA256

    412992e7fd739b72868d3c2c370d82316f459ec85736b1448ca11a3ee6c9b6bc

  • SHA512

    5de442b5b2ecbac6dccdabddc96141e5a1767cec122d97d9862d78384ddacdac55ca76ad8115c718ae40c4486796fd0ed8ad35a7b70bb6144fdc28db6bf81d5e

  • SSDEEP

    768:TJNLVRHuAeEtYcFmYB6Kb2j1W9wSAMxkENr:3bE4mYBlbC2xt

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NetLimiterPatch\NLSvc.exe
    "C:\Users\Admin\AppData\Local\Temp\NetLimiterPatch\NLSvc.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/600-0-0x000001E03C7D0000-0x000001E03C7D8000-memory.dmp

    Filesize

    32KB

  • memory/600-1-0x00007FFA2ACB3000-0x00007FFA2ACB4000-memory.dmp

    Filesize

    4KB

  • memory/600-2-0x000001E03E590000-0x000001E03E66C000-memory.dmp

    Filesize

    880KB

  • memory/600-3-0x00007FFA2ACB0000-0x00007FFA2B69C000-memory.dmp

    Filesize

    9.9MB

  • memory/600-18-0x000001E03E4B0000-0x000001E03E504000-memory.dmp

    Filesize

    336KB

  • memory/600-19-0x000001E03E540000-0x000001E03E550000-memory.dmp

    Filesize

    64KB

  • memory/600-20-0x000001E0571E0000-0x000001E05722C000-memory.dmp

    Filesize

    304KB

  • memory/600-21-0x000001E056E70000-0x000001E056E92000-memory.dmp

    Filesize

    136KB

  • memory/600-22-0x000001E03E580000-0x000001E03E58C000-memory.dmp

    Filesize

    48KB

  • memory/600-23-0x00007FFA2ACB0000-0x00007FFA2B69C000-memory.dmp

    Filesize

    9.9MB

  • memory/600-24-0x000001E057400000-0x000001E05771A000-memory.dmp

    Filesize

    3.1MB

  • memory/600-25-0x000001E057720000-0x000001E0577CA000-memory.dmp

    Filesize

    680KB

  • memory/600-26-0x000001E057380000-0x000001E0573D0000-memory.dmp

    Filesize

    320KB

  • memory/600-27-0x000001E057330000-0x000001E057342000-memory.dmp

    Filesize

    72KB

  • memory/600-28-0x000001E057810000-0x000001E05784E000-memory.dmp

    Filesize

    248KB

  • memory/600-29-0x00007FFA2ACB0000-0x00007FFA2B69C000-memory.dmp

    Filesize

    9.9MB

  • memory/600-33-0x00007FFA2ACB3000-0x00007FFA2ACB4000-memory.dmp

    Filesize

    4KB

  • memory/600-34-0x00007FFA2ACB0000-0x00007FFA2B69C000-memory.dmp

    Filesize

    9.9MB

  • memory/600-35-0x00007FFA2ACB0000-0x00007FFA2B69C000-memory.dmp

    Filesize

    9.9MB