Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 13:09

General

  • Target

    74f578d0813c4f0dcb4941c11a47353ab8a6d08fb5186ebe024a8678e9d39932.exe

  • Size

    184KB

  • MD5

    6c4277d96557003c108abceb8e22eb00

  • SHA1

    ca8af6719969c33a842a991f55790ad0ef2ddbd6

  • SHA256

    74f578d0813c4f0dcb4941c11a47353ab8a6d08fb5186ebe024a8678e9d39932

  • SHA512

    9848d5348bc2fed7974d2abd169550d4ee4b9debc262a367629321fa2c26457c6ab3ffb64723afe45f9b9817fd28050832eb4f7bd3b726e751ca37d1404a107e

  • SSDEEP

    3072:73HNQ/aXjhCKS52tJNCZ5BwmQbl+hKovtABbpBJKYw:73HNQ/8E5ipmQYHMTJq

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74f578d0813c4f0dcb4941c11a47353ab8a6d08fb5186ebe024a8678e9d39932.exe
    "C:\Users\Admin\AppData\Local\Temp\74f578d0813c4f0dcb4941c11a47353ab8a6d08fb5186ebe024a8678e9d39932.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1832

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1832-54-0x00000000004E0000-0x00000000004E5000-memory.dmp

          Filesize

          20KB