Analysis

  • max time kernel
    86s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    26-07-2021 14:49

General

  • Target

    60d92de4c9490fc49ab899cad9bb3efb.exe

  • Size

    1.6MB

  • MD5

    60d92de4c9490fc49ab899cad9bb3efb

  • SHA1

    c8b3aaa04c2790d283db59b834712aef8cb17026

  • SHA256

    c1aa3996fb100371e8d443417f1c90f959306af345dc4436d5382e49bb205ac7

  • SHA512

    c986703bc1fd4130c3a8b4b4d8f16d998b390c0b04e628f7e9d6d8c3f378be9177de71457dd2ee09f4657d3b124e9b2b295a6f40927bc2f8692adacc42ff0b97

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
    "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
      "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
      2⤵
        PID:1580
      • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
        "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
        2⤵
          PID:968
        • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
          "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
          2⤵
            PID:1700
          • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
            "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
            2⤵
              PID:560
            • C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe
              "C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"
              2⤵
                PID:1704

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1944-59-0x00000000002A0000-0x00000000002A1000-memory.dmp
              Filesize

              4KB

            • memory/1944-61-0x0000000004E30000-0x0000000004E31000-memory.dmp
              Filesize

              4KB

            • memory/1944-62-0x00000000004F0000-0x000000000051D000-memory.dmp
              Filesize

              180KB

            • memory/1944-63-0x0000000004DA0000-0x0000000004E17000-memory.dmp
              Filesize

              476KB

            • memory/1944-64-0x0000000004D20000-0x0000000004D59000-memory.dmp
              Filesize

              228KB