Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    15-10-2021 07:48

General

  • Target

    7560b03d9721036181565287e85d9525.exe

  • Size

    1.1MB

  • MD5

    7560b03d9721036181565287e85d9525

  • SHA1

    447c0d915c9236b5f3221bfbe05e5b57785d3142

  • SHA256

    f2926aaea4603961e15c9ac92eb599ddd51bd6e19bd7fded285a1db16753db87

  • SHA512

    fb38977856b6d4702b1793916c90b0b595dc8881457d6a2a98ba488f80e444314a5e1cdaa0f6a741e6c12b129195fd04f499d84a4cca32386c64fe58ccdfe583

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
    "C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
      C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
      2⤵
        PID:1264
      • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
        C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
        2⤵
          PID:516
        • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
          C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
          2⤵
            PID:580
          • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
            C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
            2⤵
              PID:268
            • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
              C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
              2⤵
                PID:832
              • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                2⤵
                  PID:876
                • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                  C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                  2⤵
                    PID:576
                  • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                    C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                    2⤵
                      PID:1356
                    • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                      C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                      2⤵
                        PID:1520
                      • C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                        C:\Users\Admin\AppData\Local\Temp\7560b03d9721036181565287e85d9525.exe
                        2⤵
                          PID:1124

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/1232-53-0x00000000003D0000-0x00000000003D1000-memory.dmp
                        Filesize

                        4KB

                      • memory/1232-55-0x0000000004A20000-0x0000000004B31000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/1232-56-0x0000000000300000-0x0000000000330000-memory.dmp
                        Filesize

                        192KB

                      • memory/1232-57-0x00000000007E0000-0x00000000007E1000-memory.dmp
                        Filesize

                        4KB