Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 15:44

General

  • Target

    IISCrypto.exe

  • Size

    341KB

  • MD5

    4fcde9159e5a68e0177590eaeee3d5c5

  • SHA1

    23794916aafc1c4af327dccb58a51a29825a929a

  • SHA256

    79b17ab2679d64212710a456a5c1713ff265949b40518f67e61a68d29c521e76

  • SHA512

    c704ca413f9874fa0b289e5cd1c50af0bb35c0768a087761c45c396dfa288d99d95902a02f12be8b177acf5eea59aeb7858fc65f4a8a3f02883052b39839bc20

  • SSDEEP

    6144:zZ23NbztYTCs7HGCut28q2AsXeg17e/fZ8h4ZxANdmt+jRd5h2rKsREF:zZ23NbzIHTNK4GfRd5h2Gn

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IISCrypto.exe
    "C:\Users\Admin\AppData\Local\Temp\IISCrypto.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4120-0-0x00007FF993183000-0x00007FF993185000-memory.dmp

    Filesize

    8KB

  • memory/4120-1-0x0000000000240000-0x0000000000296000-memory.dmp

    Filesize

    344KB

  • memory/4120-2-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-18-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-19-0x00007FF993183000-0x00007FF993185000-memory.dmp

    Filesize

    8KB

  • memory/4120-20-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-21-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-22-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-23-0x000000001BA50000-0x000000001BBF9000-memory.dmp

    Filesize

    1.7MB

  • memory/4120-24-0x00007FF993180000-0x00007FF993C41000-memory.dmp

    Filesize

    10.8MB

  • memory/4120-25-0x000000001BA50000-0x000000001BBF9000-memory.dmp

    Filesize

    1.7MB