Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    13-11-2021 12:22

General

  • Target

    9ab835eddcba87e825f2bba6551d731f.exe

  • Size

    104KB

  • MD5

    9ab835eddcba87e825f2bba6551d731f

  • SHA1

    89b372db51b1ee32ea9705056730104533399af5

  • SHA256

    cd3c3976d4df1484942e9bb438351566f586a31f6623b558417690dbac274c85

  • SHA512

    7f75daad6e99225af11bff87365a68526a84155f96f9eac126f7f088219d55d98567a215f1444f6347871d313722de59b898a9cd73a82b3a48515c0b89dbab4e

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ab835eddcba87e825f2bba6551d731f.exe
    "C:\Users\Admin\AppData\Local\Temp\9ab835eddcba87e825f2bba6551d731f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:836

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-55-0x0000000000E20000-0x0000000000E21000-memory.dmp
    Filesize

    4KB

  • memory/836-57-0x0000000004B50000-0x0000000004B51000-memory.dmp
    Filesize

    4KB