Analysis

  • max time kernel
    104s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 12:21

General

  • Target

    file.exe

  • Size

    8.5MB

  • MD5

    a5afaac697fab2c766051607ae273134

  • SHA1

    4618047e01c29c2b2fc9c7e217fdbfd290dba0d6

  • SHA256

    291977390ed9da8791a2395429c6040ba437de103c6215d80052d583221db9d2

  • SHA512

    8d1bd9173e4f1ebc464c19dfd44736773a36301bc3f4af57c9c8dd228c47b5d53a97e09465380edb300bb4c4b19bd4883ab7bd3129ba2d3310b4371ef22804c7

  • SSDEEP

    196608:LVWcUXnQ6xnIswB3ys2uypSZ4JCaqcwB3ys2uypSZ4JC7q:LVWcUXnQ6xnIp9zyS4JCaqZ9zyS4JC7q

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color F0
      2⤵
        PID:1500
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\file.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5724
        • C:\Windows\system32\certutil.exe
          certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\file.exe" MD5
          3⤵
            PID:116
          • C:\Windows\system32\find.exe
            find /i /v "md5"
            3⤵
              PID:2824
            • C:\Windows\system32\find.exe
              find /i /v "certutil"
              3⤵
                PID:2640
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:5352
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im HTTPDebuggerUI.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:936
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4392
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im HTTPDebuggerSvc.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1568
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im Ida64.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im Ida64.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5068
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im OllyDbg.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:5896
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im OllyDbg.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4588
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg64.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4708
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im Dbg64.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4728
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im Dbg32.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4760
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im Dbg32.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4704
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x2fc 0x464
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1044

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads