Analysis

  • max time kernel
    4294202s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 21:48

General

  • Target

    5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe

  • Size

    9.7MB

  • MD5

    8e4f79bdc4355ac8ae615f669249ec7b

  • SHA1

    48cabf8d1645e0bb19e7a2d619342c02b19497b5

  • SHA256

    5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346

  • SHA512

    b8037b123c834d9460fba90678559e800962438bd30a2dcb213b4bad7cfa52929dfd2c8dff60b5f0a565c5558072de13f3c4245aa00bcc9b11b44d8c65ed7730

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe
    "C:\Users\Admin\AppData\Local\Temp\5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-54-0x0000000000BE0000-0x00000000015A6000-memory.dmp

    Filesize

    9.8MB

  • memory/956-55-0x000007FEF5A30000-0x000007FEF641C000-memory.dmp

    Filesize

    9.9MB

  • memory/956-56-0x000000001BAE0000-0x000000001BAE2000-memory.dmp

    Filesize

    8KB