Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 04:40

General

  • Target

    a6f7774c76ee23dd30712fe5362651dd9895ec275ebcf84b276540d3099ad804.exe

  • Size

    83KB

  • MD5

    f049cf0b255b3697e3fd5acaddd70f30

  • SHA1

    0032a97de4339f52b31202bc19a41ad8a1a367c2

  • SHA256

    a6f7774c76ee23dd30712fe5362651dd9895ec275ebcf84b276540d3099ad804

  • SHA512

    eb9a3639821a6c28f6fd258cf9733e2ce9907431cbe83157eda4006b3a81ba150227c6f61c83ba5ab31911ad5e977670a4be0bbad8da83f51bdb07b1520dca60

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6f7774c76ee23dd30712fe5362651dd9895ec275ebcf84b276540d3099ad804.exe
    "C:\Users\Admin\AppData\Local\Temp\a6f7774c76ee23dd30712fe5362651dd9895ec275ebcf84b276540d3099ad804.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-54-0x00000000002F0000-0x0000000000370000-memory.dmp

    Filesize

    512KB

  • memory/1860-55-0x000007FEF2B50000-0x000007FEF3BE6000-memory.dmp

    Filesize

    16.6MB