Analysis

  • max time kernel
    159s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 07:46

General

  • Target

    2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62.exe

  • Size

    16KB

  • MD5

    7ca02266bc538848720225ead84aba2a

  • SHA1

    940c25a5af2413893282fc7464abe77f7abf5707

  • SHA256

    2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62

  • SHA512

    4c101bf3b24a4018ab407aa8a37a8aa3a657727128657ea6d0bd1257a5096737b8c7010303321c68f1805a99d748c8b193fdcb2452b887c55881950153c1dc35

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62.exe
    "C:\Users\Admin\AppData\Local\Temp\2bb44181c7547a69b7ea6a4d7c13baba0e623dd5049c055ad3902b3e04c68f62.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-54-0x0000000000B40000-0x0000000000B42000-memory.dmp

    Filesize

    8KB

  • memory/1696-55-0x000007FEF2F00000-0x000007FEF3F96000-memory.dmp

    Filesize

    16.6MB