Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-03-2021 09:51

General

  • Target

    0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe

  • Size

    141KB

  • MD5

    e5e56f9374a5a6dd331a0f57883bcbb5

  • SHA1

    86ae05396644baef2ddc112c0485af1f170c5bfb

  • SHA256

    0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16

  • SHA512

    3cd12ee34d28125fc82082c5b91dc82ff27069c9d21766f82fc26f1fb5487de8e63f10c751f9ae211c6ea08c47e23ed3fc2925525038ac5796a447395a248941

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-2-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/744-3-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

    Filesize

    9.6MB

  • memory/744-4-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB