Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 23:18

General

  • Target

    f14dab97f0213e6267b4e438b07b0006f13abf5d47c7b2e68fdcf8d5fedc19bb.exe

  • Size

    1.4MB

  • MD5

    eeca82991588e81f727c0d36e62871e9

  • SHA1

    5c7d62477d02a366ed882bb272cf46a21f9c3ce6

  • SHA256

    f14dab97f0213e6267b4e438b07b0006f13abf5d47c7b2e68fdcf8d5fedc19bb

  • SHA512

    3915574dde192d4b899843596d1fae081ffe6d17ad4efa51ef910e4148d03df7a8c44446bcd9a54579ef364cd6e8512197c5d6a9aeabc4d54a797cb67b71280c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f14dab97f0213e6267b4e438b07b0006f13abf5d47c7b2e68fdcf8d5fedc19bb.exe
    "C:\Users\Admin\AppData\Local\Temp\f14dab97f0213e6267b4e438b07b0006f13abf5d47c7b2e68fdcf8d5fedc19bb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1144-53-0x000007FEFB7E1000-0x000007FEFB7E3000-memory.dmp

    Filesize

    8KB