Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 18:42

General

  • Target

    4788b9f2b49471fa3f20ce9ac9fd8524.exe

  • Size

    103KB

  • MD5

    4788b9f2b49471fa3f20ce9ac9fd8524

  • SHA1

    37daa0fae772bf7634f1e71339a31252b86fd9a8

  • SHA256

    5733022e0a84fede4220137c51b947633ba407457ccaf3022bcec3876b2c7d0f

  • SHA512

    6ed4f4fc69872e2c92aa64913de9dd523fed4a8afb036462ddf20e2f210f6d0cb88c887a4b148bb0b3262bc49bf4ea8b54536b73e7b093aaeec7571595609ed8

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\4788b9f2b49471fa3f20ce9ac9fd8524.exe
    "C:\Users\Admin\AppData\Local\Temp\4788b9f2b49471fa3f20ce9ac9fd8524.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:464

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/464-55-0x0000000000210000-0x0000000000211000-memory.dmp
    Filesize

    4KB

  • memory/464-57-0x0000000004960000-0x0000000004961000-memory.dmp
    Filesize

    4KB