Analysis

  • max time kernel
    15s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 19:35

General

  • Target

    a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe

  • Size

    456KB

  • MD5

    dac7eef8f750ba52bffba2bf369151bc

  • SHA1

    e0d777aec0d963bd77a892f440fd19a1d5760b52

  • SHA256

    a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc

  • SHA512

    abd980075a13f2401ee7d39d6a5c18933cb825c7ab4897c3dea875d53c59ba06d76a6c3e54a67455315572b4f596fb454ff55ffbba40fd1258c220e733af24ac

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1708-54-0x00000000763E1000-0x00000000763E3000-memory.dmp
    Filesize

    8KB

  • memory/1708-55-0x0000000074980000-0x0000000074F2B000-memory.dmp
    Filesize

    5.7MB