Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 04:27

General

  • Target

    b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b.exe

  • Size

    26KB

  • MD5

    ab0a239a67498b1fe875cac61e1cc881

  • SHA1

    259e3a7a5350d79d7f18677aeb5dad0df3c1c4e6

  • SHA256

    b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b

  • SHA512

    657d23e85e010ed6bd71e46fdf3c56e16ac2946e6a0e341ace1440c82af0c4fb85630a5cfcd1044e80138ebd815be6bd5bf714d230d1d976e68839800f26f6b9

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b.exe
    "C:\Users\Admin\AppData\Local\Temp\b2144af6922d925a99bdb5e2264b40af2d310c556444fa61ee190ced786ff81b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1116-55-0x0000000002120000-0x0000000002122000-memory.dmp

    Filesize

    8KB

  • memory/1116-56-0x000007FEF2BE0000-0x000007FEF3C76000-memory.dmp

    Filesize

    16.6MB