Analysis

  • max time kernel
    59s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 19:52

General

  • Target

    c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe

  • Size

    7.9MB

  • MD5

    f9ccfba03895eb7877510ace1bf59a71

  • SHA1

    87a165c002005a72324064922faf48c55ed809b6

  • SHA256

    c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f

  • SHA512

    b61f17eb86b5d79e228100228f785703cc1582867b5be13b0ceda0bbe4329e2ccb31981365d0edd428e34c9db5f40bc5bc9faa54c52043f5c0983ae288ae8e47

  • SSDEEP

    196608:c9sGLbd7rEWWn87E3QeotSqrG8YqcIXcZZBy:cmqbhrEbn87eZsFmq+m

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe
    "C:\Users\Admin\AppData\Local\Temp\c3a61d282c9a5249427d1c50d79414b05441de100982cf90354b0466ec013e2f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\lgtHq.exe
      QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGMzYTYxZDI4MmM5YTUyNDk0MjdkMWM1MGQ3OTQxNGIwNTQ0MWRlMTAwOTgyY2Y5MDM1NGIwNDY2ZWMwMTNlMmYuZXhl 25
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lgtHq.exe

    Filesize

    7.9MB

    MD5

    c797777e47526a42feef5d0c628fb6ca

    SHA1

    e8302ceda5b4f0f0f7f5d1261d12e3b619c22af9

    SHA256

    1f5d002ddc98f354f6ea6ce4cd91ee674e246c8e9872a03fbecf2d602f755e72

    SHA512

    3d9e48a357a956c7f068a94114fe051264c41af98c68fb0a22e69f63a471d1d2f83691c3a24124d8896a5f91a75dc1940e68bb5e0da9555e63bf2c9815d29054

  • memory/1280-18-0x00000210C5600000-0x00000210C5608000-memory.dmp

    Filesize

    32KB

  • memory/1280-24-0x00007FFAA25B0000-0x00007FFAA25B2000-memory.dmp

    Filesize

    8KB

  • memory/1280-32-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/1280-31-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/1280-13-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/1280-14-0x00000210A9470000-0x00000210AA782000-memory.dmp

    Filesize

    19.1MB

  • memory/1280-15-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/1280-16-0x00000210AC5A0000-0x00000210AC5A8000-memory.dmp

    Filesize

    32KB

  • memory/1280-30-0x00000210C4F60000-0x00000210C512E000-memory.dmp

    Filesize

    1.8MB

  • memory/1280-25-0x00000210C9A90000-0x00000210CA516000-memory.dmp

    Filesize

    10.5MB

  • memory/1280-22-0x00000210C9A90000-0x00000210CA516000-memory.dmp

    Filesize

    10.5MB

  • memory/1280-20-0x00000210C5650000-0x00000210C565E000-memory.dmp

    Filesize

    56KB

  • memory/1280-19-0x00000210C5680000-0x00000210C56B8000-memory.dmp

    Filesize

    224KB

  • memory/1280-17-0x00000210AC590000-0x00000210AC5A0000-memory.dmp

    Filesize

    64KB

  • memory/1280-27-0x00000210C9A90000-0x00000210CA516000-memory.dmp

    Filesize

    10.5MB

  • memory/1280-28-0x00000210C9A90000-0x00000210CA516000-memory.dmp

    Filesize

    10.5MB

  • memory/2060-2-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-0-0x00007FFA83B43000-0x00007FFA83B45000-memory.dmp

    Filesize

    8KB

  • memory/2060-12-0x00007FFA83B40000-0x00007FFA84601000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-1-0x0000020282700000-0x0000020283A12000-memory.dmp

    Filesize

    19.1MB