Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 04:21
Behavioral task
behavioral1
Sample
931E03D296E920701E86FA698A223CBC.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
931E03D296E920701E86FA698A223CBC.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
931E03D296E920701E86FA698A223CBC.exe
-
Size
32KB
-
MD5
931e03d296e920701e86fa698a223cbc
-
SHA1
7f8876cc0ff72da9edf3faf20493ee865b300ddc
-
SHA256
b944c2d2b450ec2a2ffce9b121e98dd3123da5209db9a16e2822a9bc0f6dd8bf
-
SHA512
834ff46277a68b2a55a7536580675e3617bc62b65ea9cf9ace7b7113134937191f3624cdddd7084a580dd929f46bef7e36503cc6e60b95b59a15359229b41091
-
SSDEEP
384:J0bUe5XB4e0X2O3fw0Q0mS03AWTxtTUFQqzFBObbJ:yT9Bulo55dbbJ
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
931E03D296E920701E86FA698A223CBC.exedescription pid process Token: SeDebugPrivilege 3168 931E03D296E920701E86FA698A223CBC.exe Token: 33 3168 931E03D296E920701E86FA698A223CBC.exe Token: SeIncBasePriorityPrivilege 3168 931E03D296E920701E86FA698A223CBC.exe Token: 33 3168 931E03D296E920701E86FA698A223CBC.exe Token: SeIncBasePriorityPrivilege 3168 931E03D296E920701E86FA698A223CBC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
931E03D296E920701E86FA698A223CBC.exedescription pid process target process PID 3168 wrote to memory of 3764 3168 931E03D296E920701E86FA698A223CBC.exe cmd.exe PID 3168 wrote to memory of 3764 3168 931E03D296E920701E86FA698A223CBC.exe cmd.exe PID 3168 wrote to memory of 3764 3168 931E03D296E920701E86FA698A223CBC.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\931E03D296E920701E86FA698A223CBC.exe"C:\Users\Admin\AppData\Local\Temp\931E03D296E920701E86FA698A223CBC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\931E03D296E920701E86FA698A223CBC.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3168-0-0x0000000075092000-0x0000000075093000-memory.dmpFilesize
4KB
-
memory/3168-1-0x0000000075090000-0x0000000075641000-memory.dmpFilesize
5.7MB
-
memory/3168-2-0x0000000075090000-0x0000000075641000-memory.dmpFilesize
5.7MB
-
memory/3168-3-0x0000000075090000-0x0000000075641000-memory.dmpFilesize
5.7MB
-
memory/3168-4-0x0000000075092000-0x0000000075093000-memory.dmpFilesize
4KB
-
memory/3168-5-0x0000000075090000-0x0000000075641000-memory.dmpFilesize
5.7MB
-
memory/3168-7-0x0000000075090000-0x0000000075641000-memory.dmpFilesize
5.7MB