Analysis

  • max time kernel
    146s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 17:58

General

  • Target

    559011f5cf61206f21b009e0396916444d970643310ea38662023d34d008d722.exe

  • Size

    16KB

  • MD5

    0bdb6c683a46413c9cc6c54d9e724c25

  • SHA1

    3d82d132752cfb23ea388d517bcb3f7aa81e9d5e

  • SHA256

    559011f5cf61206f21b009e0396916444d970643310ea38662023d34d008d722

  • SHA512

    d9b7d778545a6f9d5013ffc15ef03e45da635fdc6d9289080024adc9ea6d581e600884aa631a945e4dab58ad85789d9249420d7266f103b3ed74a42c3bc0ac98

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\559011f5cf61206f21b009e0396916444d970643310ea38662023d34d008d722.exe
    "C:\Users\Admin\AppData\Local\Temp\559011f5cf61206f21b009e0396916444d970643310ea38662023d34d008d722.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-54-0x000007FEF3780000-0x000007FEF4816000-memory.dmp
    Filesize

    16.6MB