Analysis

  • max time kernel
    40s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    29-06-2020 18:04

General

  • Target

    FACTURA Y ALBARANES.exe

  • Size

    279KB

  • MD5

    30359e02370b8d3e1310942564e589ec

  • SHA1

    7f24ff5a96647fb6a2c8b319acfd8bf5a897ad1e

  • SHA256

    cf9be3ab22cad2af795295a926822faa4791f2268077284e4677a9fdea94bc32

  • SHA512

    b13611ebb43ed9636ebd07cb98cab5a7c733058dc01e575acd432e87e61ff105ad64f47bfeb9ccbec86670fb709b959ab86d1eef42e87f3523db0ceeaf03644f

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\FACTURA Y ALBARANES.exe
    "C:\Users\Admin\AppData\Local\Temp\FACTURA Y ALBARANES.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1500

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads