Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    21-01-2022 23:18

General

  • Target

    b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe

  • Size

    2.2MB

  • MD5

    6a9ec204144e883392a8f02b3946efd7

  • SHA1

    5406faef3d88e9cd0dc0fc98ded9e4085838ef74

  • SHA256

    b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d

  • SHA512

    c9ed4d99b50df978cd422220c755933b4996545ac29632bd06ffcf31f05413419af1193c20b741f25117b253eb1f373e9b116cce6a5ff061630bdd5f236e44c9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
    "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
      "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
      2⤵
        PID:588
      • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
        "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
        2⤵
          PID:968
        • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
          "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
          2⤵
            PID:1832
          • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
            "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
            2⤵
              PID:1920
            • C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe
              "C:\Users\Admin\AppData\Local\Temp\b09b9fbc48bcb5c721a7448e7ba97b34a58f46ee5aeb157f86df75fa8890845d.exe"
              2⤵
                PID:1944

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/316-54-0x0000000000350000-0x000000000057C000-memory.dmp
              Filesize

              2.2MB

            • memory/316-55-0x0000000076001000-0x0000000076003000-memory.dmp
              Filesize

              8KB

            • memory/316-56-0x00000000006B0000-0x00000000006BA000-memory.dmp
              Filesize

              40KB

            • memory/316-57-0x0000000004E30000-0x0000000004E31000-memory.dmp
              Filesize

              4KB

            • memory/316-58-0x0000000005AD0000-0x0000000005C9E000-memory.dmp
              Filesize

              1.8MB

            • memory/316-59-0x0000000009080000-0x00000000091FE000-memory.dmp
              Filesize

              1.5MB