Analysis

  • max time kernel
    146s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 16:40

General

  • Target

    06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe

  • Size

    16KB

  • MD5

    78ed2fd0ed8b9c5bc292366d5685c87f

  • SHA1

    4807d848979e573bd984b1eee463b84c59aa0e46

  • SHA256

    06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392

  • SHA512

    ee19d51543612ae2cc6f46f435825ce23716f8165d8e10e4d6dab07a9ce5b20c89a041a7df8067208a695818d62ffb5382ea2c45d5b7d9a877343c2a669dd144

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe
    "C:\Users\Admin\AppData\Local\Temp\06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-54-0x000007FEF3670000-0x000007FEF4706000-memory.dmp
    Filesize

    16.6MB