Analysis

  • max time kernel
    12s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:52

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    015284acad2143df3f35359347c2daa9

  • SHA1

    5b0d09e041f1ca758cda3147996d9bf18016494a

  • SHA256

    213d08e80912d16f3d53c57b498e8fc0f46ffdd0aeb36119a2827e1631dc0907

  • SHA512

    0088a2c58860fcd643b7a8a8432b1378668dd5b04979a4026bda314b863903c07437cbd6cb8eea44c6da630ca7b61b687dde57e11b373d59ad711354126d3b0e

  • SSDEEP

    786432:lkghU6KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/A:agmHDb25qz0dQAUgGXIPwbZnA

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1060
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4904
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4356
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\dropper.exe
        dropper.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" diskdrive get Model
          3⤵
            PID:740
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" diskdrive get Model
            3⤵
              PID:2304

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4876-20-0x00000247447E0000-0x0000024744800000-memory.dmp

          Filesize

          128KB

        • memory/4876-24-0x0000024746450000-0x0000024746470000-memory.dmp

          Filesize

          128KB

        • memory/4876-16-0x00000247446D0000-0x0000024744700000-memory.dmp

          Filesize

          192KB

        • memory/4876-12-0x00000206AF620000-0x00000206AF640000-memory.dmp

          Filesize

          128KB

        • memory/4876-4-0x00000206AF750000-0x00000206AF780000-memory.dmp

          Filesize

          192KB

        • memory/4876-8-0x0000024744760000-0x00000247447B0000-memory.dmp

          Filesize

          320KB

        • memory/4876-1-0x00000247455C0000-0x0000024746250000-memory.dmp

          Filesize

          12.6MB