Analysis

  • max time kernel
    22s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 17:04

General

  • Target

    d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe

  • Size

    156KB

  • MD5

    329b86085bd0058ad41bfa621ec84ab8

  • SHA1

    f32a2286a4a4914ed5c5f6aa6ddc0a7205f8fab4

  • SHA256

    d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165

  • SHA512

    7085c83dd2ec522095322f432b3530790bc6ea5eaa3e0afb56aed83dad6ed5c63d7719f35653586e26fb1fb85447bbea8181a52cdf002de5b9d751cb78f6d8f6

  • SSDEEP

    3072:7V3Lvhd2FbXWoO6rUSEPNWrnWA8/3CIOezrHZkTTDTE8gO:B7vhd2s1TSE1Wrnx8/keznO

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe
    "C:\Users\Admin\AppData\Local\Temp\d744e3c3e43a525f220220783d4519069c31ade0dcd688b2e3e1b80ae389c165.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-54-0x0000000075811000-0x0000000075813000-memory.dmp

    Filesize

    8KB