Analysis

  • max time kernel
    151s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2022 13:17

General

  • Target

    fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe

  • Size

    1.4MB

  • MD5

    0ede11e1af6813a6cc72ebd3550f9067

  • SHA1

    5f79abdafab5f5122e3146120fa328632e205f3b

  • SHA256

    fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67

  • SHA512

    06277c992722b65a54e7ec1929bc14cf013c9284d563e82cc7948ba56d1ff8f07629c154b8549c7f8d6b093f965391a9fa99f66d1a69c1bbc45cf4c43b8dce07

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe
    "C:\Users\Admin\AppData\Local\Temp\fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1936-54-0x00000000001B0000-0x00000000001E0000-memory.dmp

    Filesize

    192KB

  • memory/1936-56-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1936-57-0x000000001AEEA000-0x000000001AF09000-memory.dmp

    Filesize

    124KB

  • memory/1936-55-0x0000000000190000-0x000000000019A000-memory.dmp

    Filesize

    40KB

  • memory/1936-58-0x000000001AEEA000-0x000000001AF09000-memory.dmp

    Filesize

    124KB