Analysis

  • max time kernel
    156s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 20:09

General

  • Target

    3dd14366762547c4aa2307489c6248dec4a57bec2231433b58cdf8c5e830785a.exe

  • Size

    104KB

  • MD5

    14be26aa207cff81ff814c8a7a8e2f03

  • SHA1

    0cff5cc4c46e148d3d8c93d11c459f7ede3a854c

  • SHA256

    3dd14366762547c4aa2307489c6248dec4a57bec2231433b58cdf8c5e830785a

  • SHA512

    42c4c7867ea9cd9d6c15b437fc24d38cba8e4bb50d3bd394de082c4b2b7fd627e3ef51df2715a1b161e4e20eae0842eb8c0318eaae2dc5663ccf444f9221340e

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd14366762547c4aa2307489c6248dec4a57bec2231433b58cdf8c5e830785a.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd14366762547c4aa2307489c6248dec4a57bec2231433b58cdf8c5e830785a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/524-54-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/524-55-0x0000000075531000-0x0000000075533000-memory.dmp

    Filesize

    8KB