Resubmissions

13-02-2025 01:26

250213-btppra1pcz 10

17-01-2025 20:14

250117-yz7h3s1qfw 10

17-01-2025 20:12

250117-yy9l2sslcr 10

17-01-2025 17:25

250117-vy9p9sxpez 10

17-01-2025 17:21

250117-vw8eesyjfp 10

17-01-2025 14:16

250117-rk9ass1rhk 10

17-01-2025 14:12

250117-rhv1ds1lds 10

16-01-2025 12:52

250116-p4et7a1mez 10

Analysis

  • max time kernel
    10s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 15:53

General

  • Target

    Malware-1-master/fear.png.exe

  • Size

    66KB

  • MD5

    60ffde3dd3003cd24feeba26e47e6571

  • SHA1

    e6c57a55ca93b1f6ebccb8c5fe9757fd0801eea3

  • SHA256

    101678f77a65b5b5830a128e4c737b2aaaea5be95327ec68213ebb92e4251170

  • SHA512

    0a448886296c1f67760f2e09cbc226955c5abd833b6e7b2ce146cc673ddacca7bfbc59f2fa3f3a83381e7d67a0a677c487fc343833e3834dce84e00a6d286ca5

  • SSDEEP

    768:AQyHrxwRjWjPc/u1SDSepzEtYcF6HKc6K:AJHrOWjPcmSDSepz46Kcl

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-1-master\fear.png.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\fear.png.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3008 -s 1464
      2⤵
        PID:2944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3008-0-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

      Filesize

      4KB

    • memory/3008-1-0x0000000000130000-0x0000000000146000-memory.dmp

      Filesize

      88KB

    • memory/3008-2-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

      Filesize

      9.9MB

    • memory/3008-3-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

      Filesize

      9.9MB