Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 03:26

General

  • Target

    385040a365614ddfe8ee14d2bccb65ef5f8a123b9189ccb89144b0c6e548ea70.exe

  • Size

    976KB

  • MD5

    f6635a42087a6e45da9fa48b6eb8024e

  • SHA1

    a3c069f52e3494a7e2d5a13ba6648865c1be3e49

  • SHA256

    385040a365614ddfe8ee14d2bccb65ef5f8a123b9189ccb89144b0c6e548ea70

  • SHA512

    079de4fe9769290b96afa2a548385764f9d962152ce0ade7ba6c3f7b960d5f1336d7a3cfc554bc7f67c6fe271c4ca0bd908cb99f8d8a0f06505edce12ae4e4f0

  • SSDEEP

    3072:HaXt5hsc2+T33w68MSWjFzNaMYpa/LJ9WsXrAmbvJMRYeL:6Xt5hsc2w3w6tztfnJrAm1MRF

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\385040a365614ddfe8ee14d2bccb65ef5f8a123b9189ccb89144b0c6e548ea70.exe
    "C:\Users\Admin\AppData\Local\Temp\385040a365614ddfe8ee14d2bccb65ef5f8a123b9189ccb89144b0c6e548ea70.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\system32\audiodg.exe
      "C:\Windows\system32\audiodg.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2464 -s 20
        3⤵
          PID:2548
      • C:\Windows\system32\svchost.exe
        "C:\Windows\system32\svchost.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2468 -s 20
          3⤵
            PID:2516
        • C:\Windows\system32\msiexec.exe
          "C:\Windows\system32\msiexec.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2824 -s 184
            3⤵
              PID:2972

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2464-6-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-8-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-3-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-17-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-5-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-7-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-65-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-11-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-2-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-4-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-9-0x00000000FF030000-0x00000000FF06E000-memory.dmp

          Filesize

          248KB

        • memory/2464-10-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmp

          Filesize

          4KB

        • memory/2468-32-0x00000000FF960000-0x00000000FF99E000-memory.dmp

          Filesize

          248KB

        • memory/2468-38-0x00000000FF960000-0x00000000FF99E000-memory.dmp

          Filesize

          248KB

        • memory/2468-43-0x00000000FF960000-0x00000000FF99E000-memory.dmp

          Filesize

          248KB

        • memory/2468-30-0x000007FFFFFD7000-0x000007FFFFFD8000-memory.dmp

          Filesize

          4KB

        • memory/2824-52-0x000007FFFFFDA000-0x000007FFFFFDB000-memory.dmp

          Filesize

          4KB

        • memory/2824-53-0x00000000FF810000-0x00000000FF84E000-memory.dmp

          Filesize

          248KB

        • memory/2824-59-0x00000000FF810000-0x00000000FF84E000-memory.dmp

          Filesize

          248KB

        • memory/2824-64-0x00000000FF810000-0x00000000FF84E000-memory.dmp

          Filesize

          248KB