Analysis

  • max time kernel
    136s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2022 11:38

General

  • Target

    905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe

  • Size

    9.7MB

  • MD5

    c0051be12503e5a248ef67814dff0b54

  • SHA1

    ba37b4f1c9f98437a7ac9a20a59f4bd1208d17ce

  • SHA256

    905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed

  • SHA512

    d7a97711daf44912777a55177072dc62a69fe40474cfcaab2b5c352ca0e3054c4226ad85879225ab9c02513cef42d415e3f1e62ed74753f2b2586ddf983dadc2

  • SSDEEP

    768:f1e9aXvDotTDZKxtoS1pT5X42LEDSFdZ3iUx7eQIzaRh53a3ySPpT/:f1wa7otTYoJ2wS13Bx7fIz6v3Wp

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe
    "C:\Users\Admin\AppData\Local\Temp\905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:836

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-54-0x0000000000840000-0x00000000011F2000-memory.dmp

    Filesize

    9.7MB

  • memory/836-55-0x000007FEFC001000-0x000007FEFC003000-memory.dmp

    Filesize

    8KB