Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    14-11-2021 14:42

General

  • Target

    d4140f5a775e00e0c378b273cafd99dc.exe

  • Size

    43KB

  • MD5

    d4140f5a775e00e0c378b273cafd99dc

  • SHA1

    d2d01b17152b0b67db3e85f373a8da1ad15ecf5d

  • SHA256

    90a325ecd04db2a368f38ffa53e4970f1df87674124b84a7d3bb82630483b499

  • SHA512

    78c425c3c2d6586ed2b75b035c4edc832382da0acaa729f830e7fd8773abeb7de8eefbd62d307064a1beb5629902981382fc47460bfe64078b0f343de7240de3

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4140f5a775e00e0c378b273cafd99dc.exe
    "C:\Users\Admin\AppData\Local\Temp\d4140f5a775e00e0c378b273cafd99dc.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1544

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-55-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/1544-57-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB