Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 18:07

General

  • Target

    9262613b8a407e538462aec5902d6e8d84ad9f1345e350be3ed45098fd9a8d1b.exe

  • Size

    74KB

  • MD5

    59e0fc469d1af7532507c19b47f19960

  • SHA1

    963d63b93f28f7077c77bdbdc2ec5dc39e909a3f

  • SHA256

    9262613b8a407e538462aec5902d6e8d84ad9f1345e350be3ed45098fd9a8d1b

  • SHA512

    de1e47674afa8fec406d0dde073793b7e4528f2f0d2d8ad5f1fc2e0b551db615a564f8d506e4061073b36f8da3007b8aaebbe131d69a3eb8861785a6dea615a7

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9262613b8a407e538462aec5902d6e8d84ad9f1345e350be3ed45098fd9a8d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\9262613b8a407e538462aec5902d6e8d84ad9f1345e350be3ed45098fd9a8d1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-54-0x0000000075CE1000-0x0000000075CE3000-memory.dmp

    Filesize

    8KB

  • memory/1468-55-0x0000000000D60000-0x0000000000D61000-memory.dmp

    Filesize

    4KB