Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 03:31

General

  • Target

    dcccd5e29b6209cec0a993bfa4e23c5635bf2edecf3cc3102b12ae1771e33eda.exe

  • Size

    16KB

  • MD5

    ac364d705c3202a741f48eff258e0338

  • SHA1

    75a0eef72f700bce8a582feb570d2156bc79bb64

  • SHA256

    dcccd5e29b6209cec0a993bfa4e23c5635bf2edecf3cc3102b12ae1771e33eda

  • SHA512

    7046d13649566234d10172910475a901a67681a30e59722339c30563887a9de05db25af1ac1729796f0bcc18956f55151b287aab5b0e6a5b2b7ffd6162b798fe

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcccd5e29b6209cec0a993bfa4e23c5635bf2edecf3cc3102b12ae1771e33eda.exe
    "C:\Users\Admin\AppData\Local\Temp\dcccd5e29b6209cec0a993bfa4e23c5635bf2edecf3cc3102b12ae1771e33eda.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/828-55-0x0000000000B70000-0x0000000000B72000-memory.dmp

    Filesize

    8KB

  • memory/828-56-0x000007FEF1F20000-0x000007FEF2FB6000-memory.dmp

    Filesize

    16.6MB