Analysis

  • max time kernel
    15s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 01:29

General

  • Target

    e1f0b573e9646c8f3ffa77e673f135b1a0f238ef6cbfc24dc10d7a7145481a4e.exe

  • Size

    139.4MB

  • MD5

    e08ed9de0ccb75dea712f14814e13bfc

  • SHA1

    333e795e160d026277c27c70987973238195aee1

  • SHA256

    e1f0b573e9646c8f3ffa77e673f135b1a0f238ef6cbfc24dc10d7a7145481a4e

  • SHA512

    e35b3259bb837766c0345c43de3c13d121cb8717fb5e038868cf7b4a382719d224c69ca4a2e8acdefb1cf46033b4902902fd53d670755f5f849c7e09e44a66ed

  • SSDEEP

    786432:SO4LSSbcLIo2T+jTFK7TkLy/c8fXQA7s0epKAo1xTtLwSTRpf4P1wT16urE:SLSSC72SjTFK7TePKv5FD4

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f0b573e9646c8f3ffa77e673f135b1a0f238ef6cbfc24dc10d7a7145481a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f0b573e9646c8f3ffa77e673f135b1a0f238ef6cbfc24dc10d7a7145481a4e.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2348-1-0x0000000180000000-0x0000000180A23000-memory.dmp

    Filesize

    10.1MB

  • memory/2348-4-0x0000000000520000-0x000000000056B000-memory.dmp

    Filesize

    300KB

  • memory/2348-3-0x000000013FAEE000-0x000000013FAEF000-memory.dmp

    Filesize

    4KB

  • memory/2348-7-0x0000000023CC0000-0x0000000024971000-memory.dmp

    Filesize

    12.7MB

  • memory/2348-22-0x0000000001CC0000-0x0000000001CD8000-memory.dmp

    Filesize

    96KB

  • memory/2348-19-0x00000000004D0000-0x00000000004F0000-memory.dmp

    Filesize

    128KB

  • memory/2348-16-0x0000000000120000-0x000000000012D000-memory.dmp

    Filesize

    52KB

  • memory/2348-13-0x0000000022D40000-0x0000000022E01000-memory.dmp

    Filesize

    772KB

  • memory/2348-10-0x00000000004F0000-0x0000000000502000-memory.dmp

    Filesize

    72KB

  • memory/2348-43-0x0000000001D00000-0x0000000001D0A000-memory.dmp

    Filesize

    40KB

  • memory/2348-37-0x0000000023200000-0x00000000232FE000-memory.dmp

    Filesize

    1016KB

  • memory/2348-34-0x0000000002360000-0x00000000023A0000-memory.dmp

    Filesize

    256KB

  • memory/2348-31-0x0000000001D30000-0x0000000001D51000-memory.dmp

    Filesize

    132KB

  • memory/2348-25-0x0000000001CE0000-0x0000000001CF3000-memory.dmp

    Filesize

    76KB

  • memory/2348-47-0x0000000023480000-0x0000000023535000-memory.dmp

    Filesize

    724KB

  • memory/2348-40-0x0000000000510000-0x0000000000517000-memory.dmp

    Filesize

    28KB

  • memory/2348-49-0x00000000023A0000-0x00000000023B6000-memory.dmp

    Filesize

    88KB

  • memory/2348-55-0x00000000021A0000-0x00000000021A5000-memory.dmp

    Filesize

    20KB

  • memory/2348-52-0x0000000022F10000-0x0000000022F4C000-memory.dmp

    Filesize

    240KB

  • memory/2348-61-0x00000000021B0000-0x00000000021CD000-memory.dmp

    Filesize

    116KB

  • memory/2348-58-0x0000000002400000-0x000000000242A000-memory.dmp

    Filesize

    168KB

  • memory/2348-67-0x0000000023420000-0x0000000023428000-memory.dmp

    Filesize

    32KB

  • memory/2348-64-0x00000000254C0000-0x00000000255B4000-memory.dmp

    Filesize

    976KB