Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 07:52

General

  • Target

    ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe

  • Size

    233KB

  • MD5

    80e5eefcbbea05456c41c3cd02d455b0

  • SHA1

    b8bfee191848802dd289c990bcb90d1de8e561ce

  • SHA256

    ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d

  • SHA512

    add48e5871113d09fa145109909e64f7c41b3b4c5e282b4c3eed9a97920a0506c9f48bceeb4c1a7ade1e00fc7401bc257aee408c609c9e265033bf3cc16ad360

  • SSDEEP

    3072:KXEX6BU4XBvLFgGkTBpx1KDRrYljpvNNpxSPxII0pIIKm/TducQ:zlOvLFgvpDsSBpvNNjoII0pIIKaduc

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe
    "C:\Users\Admin\AppData\Local\Temp\ee56fdd41bab348bf9d4078099d3101c38a7eccff3b4121167b401790440000d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1348-54-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB

  • memory/1348-55-0x0000000000260000-0x000000000028A000-memory.dmp

    Filesize

    168KB

  • memory/1348-56-0x0000000000440000-0x0000000000469000-memory.dmp

    Filesize

    164KB