Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 14:35

General

  • Target

    bd1746091ff430fbb749fc11ae3374b45375303840379f98b2576ad5bfc94104.exe

  • Size

    96KB

  • MD5

    e7ad33bb7c7af173c7a0b1f66ab4c7ae

  • SHA1

    ea342e170658732483329218a6bd76d127ba39bb

  • SHA256

    bd1746091ff430fbb749fc11ae3374b45375303840379f98b2576ad5bfc94104

  • SHA512

    580bd733735de5a3964b034274621fd9998d03ced2a6bb2590d75dcb1e025b4f54bbf76e282b5db4ed8303814c7c60ca06a31211940753202ee09fcebb255df0

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1746091ff430fbb749fc11ae3374b45375303840379f98b2576ad5bfc94104.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1746091ff430fbb749fc11ae3374b45375303840379f98b2576ad5bfc94104.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-55-0x0000000076B81000-0x0000000076B83000-memory.dmp

    Filesize

    8KB

  • memory/952-56-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB