Analysis

  • max time kernel
    36s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 03:35

General

  • Target

    5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe

  • Size

    500KB

  • MD5

    2be1cf5946f892873da6d9b75fa28125

  • SHA1

    0ca577b62f98d95c5dff92787a1d483fdbafb100

  • SHA256

    5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538

  • SHA512

    2ca0607efcc40d91fabc4336e79860a0faf643dff75683e4a2a87ce2d4c37e4f43a8684f4443033e07387d08521d2ebc8c22ac5e979387537e51c9478af7af1e

  • SSDEEP

    12288:iPnTu/MkZh2wWzVl1Uq0ijwUywBdvJFrHNcHGu3hWZOIc8:QpTzjuqumrKGu3P

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe
    "C:\Users\Admin\AppData\Local\Temp\5f7d81baea14d64f41e0172625baa0a03771ddf660cf28bb20f56cb608b80538.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

    Filesize

    8KB

  • memory/744-55-0x0000000074800000-0x0000000074DAB000-memory.dmp

    Filesize

    5.7MB