Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 14:57

General

  • Target

    cede5730a0155749a2a36ae72c7eb1813f8d124da00c2dc3c70fbf78fb8f7cb9.exe

  • Size

    103KB

  • MD5

    dac44b9d5a8494a3293088c9678754bc

  • SHA1

    e461dab1b0edda108f70572a10e8dc75e947e0f9

  • SHA256

    cede5730a0155749a2a36ae72c7eb1813f8d124da00c2dc3c70fbf78fb8f7cb9

  • SHA512

    bb750a1ef8c45360cf831b00e324ba4cc8587e08190bccb8a27651b8e727a63505f1130bd25209292a2986c9896c526fe2f17adf3c82257d501e0685afd26dc2

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cede5730a0155749a2a36ae72c7eb1813f8d124da00c2dc3c70fbf78fb8f7cb9.exe
    "C:\Users\Admin\AppData\Local\Temp\cede5730a0155749a2a36ae72c7eb1813f8d124da00c2dc3c70fbf78fb8f7cb9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/648-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

    Filesize

    8KB

  • memory/648-55-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

    Filesize

    4KB