Analysis

  • max time kernel
    60s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2022, 16:22 UTC

General

  • Target

    8953f8e2562cd7da70239e9725245c82.exe

  • Size

    882KB

  • MD5

    8953f8e2562cd7da70239e9725245c82

  • SHA1

    8e3e21be1c2d04c40f07a0cd9530581f036ec553

  • SHA256

    9882c7180787d5a337eec43f8988effe4e01cc2705a70e0f431da1bbe8cb719b

  • SHA512

    d67ef7b69bd8b4ac5b8a4277cb5bee09ed916503b204d62b549e1ee806a4d13e4ed4be7634c00378ccc6af65cc00a4bfa7983e16aedb65cfd193e945b725fa16

  • SSDEEP

    12288:nFnvw0OPVk0RtsE4rNiLytjadiZe/+3SG+Sf5xvPeSiI4Uz:Rw320VTL4ciZBZxHeSdT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
    "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
      "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
      2⤵
        PID:1328
      • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
        "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
        2⤵
          PID:840
        • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
          "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
          2⤵
            PID:1240
          • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
            "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
            2⤵
              PID:1392
            • C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe
              "C:\Users\Admin\AppData\Local\Temp\8953f8e2562cd7da70239e9725245c82.exe"
              2⤵
                PID:1452

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1636-54-0x0000000000360000-0x0000000000442000-memory.dmp

              Filesize

              904KB

            • memory/1636-55-0x0000000075E51000-0x0000000075E53000-memory.dmp

              Filesize

              8KB

            • memory/1636-56-0x0000000000350000-0x0000000000366000-memory.dmp

              Filesize

              88KB

            • memory/1636-57-0x0000000000490000-0x000000000049C000-memory.dmp

              Filesize

              48KB

            • memory/1636-58-0x0000000005D90000-0x0000000005E24000-memory.dmp

              Filesize

              592KB

            • memory/1636-59-0x0000000002190000-0x00000000021CA000-memory.dmp

              Filesize

              232KB

            We care about your privacy.

            This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.