Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 19:38

General

  • Target

    bef7fe1a58535d2f940b8536ff6cf311d85a20288e83fb4fd3a7b4ab1bf2b69c.exe

  • Size

    170KB

  • MD5

    214eb28f04d969c9f637b09e4ffad644

  • SHA1

    b94a476a2ef9737e90c4c4c9ca10acbe57b87e3b

  • SHA256

    bef7fe1a58535d2f940b8536ff6cf311d85a20288e83fb4fd3a7b4ab1bf2b69c

  • SHA512

    3efe0c464170947fe7fea30d4aecba2c0bb4d5e47f3d739fdbb6c9489357e971c719f2ccef45e5cfd7ec216a9b6ba63e259e23aa21d72b826af0eb2f0cb10fbf

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bef7fe1a58535d2f940b8536ff6cf311d85a20288e83fb4fd3a7b4ab1bf2b69c.exe
    "C:\Users\Admin\AppData\Local\Temp\bef7fe1a58535d2f940b8536ff6cf311d85a20288e83fb4fd3a7b4ab1bf2b69c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1712

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1712-54-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1712-55-0x0000000075D61000-0x0000000075D63000-memory.dmp

    Filesize

    8KB