Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    12-10-2021 12:15

General

  • Target

    PCS TENDER PROFILE-20210920.exe

  • Size

    33KB

  • MD5

    d1fe1af58a4415d8cf2077859c54c890

  • SHA1

    3d816d34c7eb5ad8acd9acdf58ff592be2c7abd6

  • SHA256

    7c20ae59b3664ed8156619a16a1b7f5764f059cc7ebd3c77f3348ca7cd03340d

  • SHA512

    e2aa13533fafadbd223777f6defa1055829f14b71b947f6256798e09d2cd6e094b32054aa7dd26621f11c16a519b2d0d831e7c9aba42a750dad7b0d3eb1698fe

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PCS TENDER PROFILE-20210920.exe
    "C:\Users\Admin\AppData\Local\Temp\PCS TENDER PROFILE-20210920.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1232

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1232-53-0x0000000000BD0000-0x0000000000BD1000-memory.dmp
    Filesize

    4KB

  • memory/1232-55-0x0000000074F81000-0x0000000074F83000-memory.dmp
    Filesize

    8KB

  • memory/1232-56-0x0000000004F70000-0x0000000004F71000-memory.dmp
    Filesize

    4KB