Analysis

  • max time kernel
    153s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    08-09-2021 14:17

General

  • Target

    C2EAFE4533DB528FE305B4A3077B18BE3409FDF9BBC65.exe

  • Size

    32KB

  • MD5

    5e1e7f63b5a6c81cd575cda3cefdb695

  • SHA1

    56c177f8975169b00e0d46014931c6fcedea355e

  • SHA256

    c2eafe4533db528fe305b4a3077b18be3409fdf9bbc655f0626ee550fc00c6c1

  • SHA512

    89bf73f8c108ea47df5b1daa042bffca94a5375a2c33374f7e1e7eb0cea2b878d1e59dcbb2adae02268395fa54d2ddbdf007b2272d81664d1a97a1a5b8b51b2a

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C2EAFE4533DB528FE305B4A3077B18BE3409FDF9BBC65.exe
    "C:\Users\Admin\AppData\Local\Temp\C2EAFE4533DB528FE305B4A3077B18BE3409FDF9BBC65.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/736-53-0x0000000075E51000-0x0000000075E53000-memory.dmp
    Filesize

    8KB

  • memory/736-54-0x0000000000C50000-0x0000000000C51000-memory.dmp
    Filesize

    4KB

  • memory/736-55-0x0000000000C51000-0x0000000000C52000-memory.dmp
    Filesize

    4KB