Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
31-07-2021 06:05
Behavioral task
behavioral1
Sample
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
Resource
win7v20210408
General
-
Target
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
-
Size
45KB
-
MD5
acea5fb0f0dd0ad6e33cedbaed6fdbd9
-
SHA1
b8c8d170b78ba0f117fc13ddb1ace03efd2a8b0b
-
SHA256
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa
-
SHA512
adb12002574276b0357e5971d3fd9c7a9e57a3d34800693ce5f357d09f548051819376f669a1727db363566aa9574b11edb0fec89e55ac5c7df88275ac0f179b
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses ⋅ 2 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exepid process 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe -
Suspicious use of AdjustPrivilegeToken ⋅ 1 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exedescription pid process Token: SeDebugPrivilege 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe -
Suspicious use of SetWindowsHookEx ⋅ 2 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exepid process 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe"C:\Users\Admin\AppData\Local\Temp\76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/1640-60-0x0000000000FF0000-0x0000000000FF1000-memory.dmpFilesize
4KB
-
memory/1640-62-0x0000000000F60000-0x0000000000F62000-memory.dmpFilesize
8KB
-
memory/1640-63-0x0000000000F62000-0x0000000000F63000-memory.dmpFilesize
4KB
-
memory/1640-64-0x0000000000F64000-0x0000000000F65000-memory.dmpFilesize
4KB
-
memory/1640-65-0x0000000000F69000-0x0000000000F88000-memory.dmpFilesize
124KB
Loading data