Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 09:03

General

  • Target

    202107270010.exe

  • Size

    13KB

  • MD5

    3dff5c2b37da43ac40de3e0d5fa5b357

  • SHA1

    ad8051789c990e68f850ad5d58bea12e321bae18

  • SHA256

    730bfa776152c38152b5c9180061bf02b4b63a62f2f214cf022bce4bda218c8a

  • SHA512

    b866abd538be4fde091b9f4498c25d6096d55667bad638ad96fb305fd54b140072d27fd0cb7f574581f5de8f33b58cc41bcfc595a5474eb8be663f6b7505da14

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202107270010.exe
    "C:\Users\Admin\AppData\Local\Temp\202107270010.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-60-0x0000000000E70000-0x0000000000E71000-memory.dmp
    Filesize

    4KB

  • memory/1208-62-0x00000000044E0000-0x00000000044E1000-memory.dmp
    Filesize

    4KB

  • memory/1208-63-0x00000000044E5000-0x00000000044F6000-memory.dmp
    Filesize

    68KB